www.fortinet.com
Open in
urlscan Pro
2406:da18:ad1:1102:e3ad:8cb3:e698:cb06
Public Scan
Submitted URL: https://401.tw/Mr6E
Effective URL: https://www.fortinet.com/blog/threat-research/threat-actors-exploit-geoserver-vulnerability-cve-2024-36401
Submission: On September 20 via api from IN — Scanned from JP
Effective URL: https://www.fortinet.com/blog/threat-research/threat-actors-exploit-geoserver-vulnerability-cve-2024-36401
Submission: On September 20 via api from IN — Scanned from JP
Form analysis
1 forms found in the DOMGET /blog/search
<form class="b3-searchbox__form" action="/blog/search" method="get">
<input class="b3-searchbox__input" type="text" name="q" placeholder="Search Blogs">
<button class="b3-searchbox__icon" aria-label="Search" type="submit">
<svg viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg">
<path
d="M15.688 14.18l-4.075-4.075C12.36 9.06 12.8 7.78 12.8 6.4 12.8 2.87 9.93 0 6.4 0 2.87 0 0 2.87 0 6.4c0 3.53 2.87 6.4 6.4 6.4 1.38 0 2.66-.44 3.705-1.187l4.075 4.075c.207.208.48.312.753.312.274 0 .547-.104.755-.312.416-.417.416-1.093 0-1.51zM2.133 6.4c0-2.357 1.91-4.267 4.267-4.267s4.267 1.91 4.267 4.267-1.91 4.267-4.267 4.267S2.133 8.757 2.133 6.4z"
fill="#fff">
</path>
</svg>
</button>
</form>
Text Content
Blog * Categories * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Life at Fortinet * Partners * Customer Stories * PSIRT Blogs * Business & Technology * FortiGuard Labs Threat Research * Industry Trends * Life at Fortinet * Partners * Customer Stories * PSIRT Blogs * CISO Collective * Subscribe FortiGuard Labs Threat Research THREAT ACTORS EXPLOIT GEOSERVER VULNERABILITY CVE-2024-36401 By Cara Lin and Vincent Li | September 05, 2024 * Article Contents * Overview GOREVERSE SideWalkMirai Variant - JenXCondiCoinMiner[1][2][3][4] * Conclusion Fortinet Protection * IoC URLIP Address/HostnameWalletSHA256Hash By Cara Lin and Vincent Li | September 05, 2024 Affected Platforms: GeoServer prior to versions 2.23.6, 2.24.4, and 2.25.2 Impacted Users: Any organization Impact: Remote attackers gain control of the vulnerable systems Severity Level: Critical GeoServer is an open-source software server written in Java that allows users to share and edit geospatial data. It is the reference implementation of the Open Geospatial Consortium (OGC) Web Feature Service (WFS) and Web Coverage Service (WCS) standards. On July 1, the project maintainers released an advisory for the vulnerability CVE-2024-36401 (CVSS score: 9.8). Multiple OGC request parameters allow remote code execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The shortcoming has been addressed in versions 2.23.6, 2.24.4, and 2.25.2. On July 15, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical security flaw impacting OSGeo GeoServer GeoTools to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation. FortiGuard Labs added the IPS signature the next day and has observed multiple campaigns targeting this vulnerability to spread malware. The botnet family and miner groups strike the attack immediately. We also collect sidewalk backdoors, and GOREVERSE tries to exploit this vulnerability and set a connection with a command and control server (C2) to execute malicious actions. OVERVIEW In this article, we will explore the details of the payload and malware. GOREVERSE Figure 1: Attack packet The payload retrieves a script from “hxxp://181[.]214[.]58[.]14:61231/remote.sh.” The script file first verifies the victim’s operating system and architecture to download the appropriate file, which it saves as “download_file.” It accommodates various OS types, including Linux, FreeBSD, Illumos, NetBSD, OpenBSD, and Solaris. After execution, it deletes the file to remove traces of its activity. Figure 2: Script file “remote.sh” The ultimate executable is “GOREVERSE," packed with UPX. GOREVERSE is a malicious tool that often functions as a reverse proxy server, allowing attackers to illicitly access target systems or data. Figure 3: GOREVERSE Once executed, the connection is made to a specific IP address (181[.]214[.]58[.]14) and port (18201), which is not a standard SSH port. Figure 4: GOREVERSE’s log From the exploitation packet of CVE-2024-36401, we observed threat actors attempting to access IT service providers in India, technology companies in the U.S., government entities in Belgium, and telecommunications companies in Thailand and Brazil. SIDEWALK Figure 5: Attack packet The attacker fetches the script from “hxxp://1[.]download765[.]online/d.” This batch file facilitates the download of execution files. All the ELF files on the remote server, known as the “SideWalk” malware, are designed to operate on ARM, MIPS, and X86 architectures. SideWalk is a sophisticated Linux backdoor malware also often linked with the hacking group APT41. Figure 6: Script file “d” First, SideWalk creates a folder named with a randomly generated string in the TMP directory. It then decodes two library files, libc.so.0 and ld-uClibc.so.1, along with the next-stage payload using the XOR key 0xCC. These decoded files are then stored in the previously created folder in the TMP path. Figure 7: Creating the folder and files Figure 8: XOR decoded with 0xCC Figure 9: Saved decoded files Then, it also uses XOR to decode the string data using the key 0x89. Figure 10: XOR decoded with 0x89 It then executes the next stage payload, “ych7s5vvbb669ab8a.” It has three main functions: 1. Decrypt configuration: The configuration is decrypted using the ChaCha20 algorithm. The binary input contains a 16-byte MD5 hash, a 12-byte nonce for ChaCha20 decryption, and a 4-byte section indicating the length of the ciphertext, followed by the actual ciphertext. Based on the assembly code, the decryption key is hard-coded as “W9gNRmdFjxwKQosBYhkYbukO2ejZev4m,” and the decryption process runs 15 rounds (0xF). After successful decryption, the extracted C2 is secure[.]systemupdatecdn[.]de (47[.]253[.]46[.]11), listening on port 80, with the mutex name “hfdmzbtu.” Figure 11: Decrypted configuration with ChaCha20 Figure 12: Encrypted binary Figure 13: Decrypted configuration 2. Establish C2 communication: Communication with the C2 server is established using an encrypted session, also based on the ChaCha20 algorithm. The packet structure comprises a 4-byte section representing the packet length, a 12-byte nonce for ChaCha20 decryption, 20 bytes of message metadata, and the final ciphertext. The initial exchange includes keys (v-key and s-key) for subsequent message encryption. In early packets, the original key, “W9gNRmdFjxwKQosBYhkYbukO2ejZev4m,” decrypts the message metadata, while the exchanged keys (v-key and s-key) decrypt the ciphertext. In packet 5, the victim’s information (computer name, operating system, and system time) is transmitted. Figure 14: Packet capture of the C2 connection Figure 15: C2 communication 3. Execute the command issued by C2: In this attack scenario, we find a Plugin named Fast Reverse Proxy (FRP.) Fast Reverse Proxy (FRP) is a legitimate and widely-used tool that complicates the detection of malicious network traffic by blending it with normal traffic, thereby enhancing the stealthiness of cyberattacks. Because it is open source, this tool has been leveraged in the past by several threat actors, such as Magic Hound, Fox Kitten, and Volt Typhoon. Using FRP, attackers create an encrypted tunnel from an internally compromised machine to an external server under their control. This method enables them to maintain a foothold within compromised environments, exfiltrate sensitive data, deploy further malicious payloads, or execute other operations. In this attack case, SideWalk also downloads a customized configuration file that directs the connection to a remote server (47[.]253[.]83[.]86) via port 443, further enhancing the attacker's control and persistence. Figure 16: FRP's configuration Figure 17: Packet capture of FRP Analysis of the script download URL's telemetry reveals a concentrated pattern of infections. The primary targets appear to be distributed across three main regions: South America, Europe, and Asia. This geographical spread suggests a sophisticated and far-reaching attack campaign, potentially exploiting vulnerabilities common to these diverse markets or targeting specific industries prevalent in these areas. Figure 18: Telemetry MIRAI VARIANT - JENX Figure 19: Attack packet This script downloads and executes a file named “sky” from a specified URL, “hxxp://188[.]214[.]27[.]50:4782. “ It changes its permissions to make it executable, runs it with the parameter “geo,” and then deletes the file. Figure 20: XOR decoded function The configuration data is extracted by XORing the file contents with 0x3A. This enabled us to find information like “bots[.]gxz[.]me,” which is the C2 server the malware attempts to connect to. Figure 21: Decoded configuration data When executing the malware, a string shows up. Figure 22: Execution message This malware has a credential list for brute-force attacks and a hard-coded payload related to the Huawei router vulnerability CVE-2017-17215. The payload attempts to download malware from 59[.]59[.]59[.]59. Figure 23: Hard-coded payload CONDI The attacker first terminates several processes (mpsl, mipsel, bash.mpsl, mips, x86_64, x86), then downloads and executes multiple bot binaries for different CPU architectures (such as ARM, MIPS, PPC, X86, M68K, SH4, and MPSL) from a remote server, “hxxp://209[.]146[.]124[.]181:8030.” The binaries are fetched using wget, saved in the /tmp directory, made executable (chmod 777), and executed. Figure 24: Attack packet The following section uses “bot.arm7” as an example. The malware can be recognized by the specified string “condi.” Figure 25: Significant string Executing the malware sends numerous DNS queries to “trcpay[.]xyz.” Figure 26: Continually connecting to the C2 server The Condi botnet first tries to resolve the C2 server address and its function. It then establishes a connection with the C2 server and waits to parse the command. The malware has numerous DDoS attack methods, such as TCP flooding, UDP flooding, and a VSE DDoS attack. In tracing the connection back to the remote server, “hxxp://209[.]146[.]124[.]181:8030,” we found that it was built as an HFS (HTTP File Server) and that two malicious tools—“Linux2.4” (another botnet) and “taskhost.exe” (the agent tool)—are located in the server. The botnet “Linux2.4” not only has different methods that can trigger a DDoS attack but can also act as a backdoor agent. The tool first connects to a server, which is the same as the remote server “209[.]146[.]124[.]181.” It then gathers the host information. Later, it waits for the command to either conduct a remote command execution or trigger a DDoS attack. Figure 27: DDoS attack methods The Backdoor malware “taskhost.exe” is designed especially for Windows. It creates a service named “9jzf5” for persistence and then creates different process types to retrieve information from attackers lurking in the host. Figure 28: Creating a service with the name “9jzf5” Figure 29: Command execution COINMINER We found four types of incident coin miners that can be delivered to victim hosts, as shown in the following details. [1] Figure 30: Attack packet The attacker downloads a script from a remote URL “hxxp://oss[.]17ww[.]vip/21929e87-85ff-4e98-a837-ae0079c9c860[.]txt/test.sh” and saves it as script.sh in the temp folder. The payload within the incident packets then modifies and executes the script to achieve various purposes. Figure 31: Script file “test.sh” The script first gathers host information, such as the location of Aegis, the distribution version of Linux. Afterward, it attempts to uninstall different cloud platforms, like Tencent Cloud, Oracle, Kingsoft Cloud, JD Cloud, and Ali Cloud, to evade monitoring agents from those cloud services. A noteworthy point is that the comments in the script are written in simplified Chinese, indicating that the miner campaign/author may be affiliated with a Chinese group. While finishing these uninstalls, the script kills some security defense mechanisms processes and checks whether the current user has the root privilege needed to uninstall those mechanisms. If everything executes successfully, the script downloads the coin miner and creates another script for persistence. Figure 32: Download and persistence within “test.sh” The coin miner, named “sshd,” wrote the configuration within itself. The miner points to two target pools: “sdfasdfsf[.]9527527[.]xyz:3333” and “gsdasdfadfs[.]9527527[.]xyz:3333.” Figure 33: Coin miner configuration [2] Figure 34: Attack packet Another type of coin miner attack begins with the Base64-encoded command. It intends to download “linux.sh” from “hxxp://repositorylinux.com.” The comment in “linux.sh” is written in Sundanese, an Indonesian language. Figure 35: Script file “linux.sh” The script downloads two files: a coin miner named “linuxsys“ and a related configuration file named “config.json.” It downloads these through an AWS (Amazon Web Service) cloud platform service the attacker holds. Figure 36: Config file “config.json” The coin miner sets the pool URL “pool[.]supportxmr[.]com:80” with credentials using “config.json.” The miner itself is XMRig, which can be recognized through its data. Figure 37: Coin miner “linuxsys” [3] Figure 38: Attack packet The action sent via four packets is to download “/tmp/MmkfszDi” from the remote server “hxxp://95[.]85[.]93[.]196:80/asdfakjg.sh,” make it executable, and then run it. The script downloads a coin miner like the others mentioned before. It also removes a list of files within “/tmp,” “/var,” "/usr," and “/opt.” Figure 39: Script file “asdfakjg.sh” The coin miner named “h4” is similar to the other two types mentioned. It is XMRig as well and embeds its configuration within the binary file. The miner sets the pool URL as “asdfghjk[.]youdontcare[.]com:81” Figure 40: Configuration data embedded in “h4” [4] Figure 41: Attack packet The last type of coin miner incident command is also encoded with base64. It downloads “cron.sh” from “112[.]133[.]194[.]254.” This fraudulent site mimics the webpage of the Institute of Chartered Accountants of India (ICAI). The site is currently removed. Figure 42: Fraudulent site “cron.sh” uses the job scheduler on the Unix-like operating system “cron,” as its name indicates. The script schedules jobs for things like downloading coin miner-related scripts and setting the scripts into “crontab.” It first downloads the script named “check.sh” from the same source IP “112[.]133[.]194[.]254” and executes the script. Figure 43: Script file “cron.sh” “check.sh” first creates the necessary directories and confirms that the victim host hasn’t been infected. Once the script finds that the victim host is the first to be infected, it downloads “config.sh” from the attacker’s IP “112[.]133[.]194[.]254” and the XMRig coin miner from the developer platform “Github.” Figure 44: Script file “check.sh” Through “config.sh,” we learned that the attacker set the pool on SupportXMR “pool[.]supportxmr[.]com:3333” Figure 45: Script File “config.sh” CONCLUSION While GeoServer’s open-source nature offers flexibility and customization, it also necessitates vigilant security practices to address its vulnerabilities. The developer patched the vulnerability with the function “JXPathUtils.newSafeContext” instead of the original vulnerable one to evaluate the XPath expression safety. However, implementing comprehensive cybersecurity measures—such as regularly updating software, employing threat detection tools, and enforcing strict access controls—can significantly mitigate these risks. By proactively addressing these threats, organizations can secure their environments and ensure the protection and reliability of these data infrastructures. FORTINET PROTECTION The malware described in this report is detected and blocked by FortiGuard Antivirus as: Adware/Miner BASH/Agent.CPC!tr BASH/Miner.VZ!tr Data/Miner.2F82!tr Data/Miner.3792!tr ELF/Agent.CPN!tr ELF/Agent.CPN.TR ELF/BitCoinMiner.HF!tr ELF/Flooder.B!tr Linux/CoinMiner.ACZ!tr Linux/Mirai.CEA!tr Linux/Mirai.CJS!tr Linux/Mirai.IZ1H9!tr Linux/SideWalk.Q!tr Riskware/CoinMiner W32/ServStart.IO!tr FortiGate, FortiMail, FortiClient, and FortiEDR support the FortiGuard AntiVirus service. The FortiGuard AntiVirus engine is part of each of these solutions. As a result, customers who have these products with up-to-date protections are protected. The FortiGuard Web Filtering Service blocks the C2 servers and downloads URLs. FortiGuard Labs provides IPS signatures against attacks exploiting the following vulnerability: CVE-2024-36401: GeoServer.OGC.Eval.Remote.Code.Execution We also suggest that organizations go through Fortinet’s free training module: Fortinet Certified Fundamentals (FCF) in Cybersecurity. This module is designed to help end users learn how to identify and protect themselves from phishing attacks. FortiGuard IP Reputation and Anti-Botnet Security Service proactively block these attacks by aggregating malicious source IP data from the Fortinet distributed network of threat sensors, CERTs, MITRE, cooperative competitors, and other global sources that collaborate to provide up-to-date threat intelligence about hostile sources. If you believe this or any other cybersecurity threat has impacted your organization, please contact our Global FortiGuard Incident Response Team. IOC URL hxxp://181[.]214[.]58[.]14:61231/remote.sh hxxp://1[.]download765[.]online/d hxxp://188[.]214[.]27[.]50:4782/sky hxxp://209[.]146[.]124[.]181:8030/bot[.]arm hxxp://209[.]146[.]124[.]181:8030/bot[.]arm5 hxxp://209[.]146[.]124[.]181:8030/bot[.]arm6 hxxp://209[.]146[.]124[.]181:8030/bot[.]arm7 hxxp://209[.]146[.]124[.]181:8030/bot[.]m68k hxxp://209[.]146[.]124[.]181:8030/bot[.]mips hxxp://209[.]146[.]124[.]181:8030/bot[.]mpsl hxxp://209[.]146[.]124[.]181:8030/bot[.]ppc hxxp://209[.]146[.]124[.]181:8030/bot[.]sh4 hxxp://209[.]146[.]124[.]181:8030/bot[.]x86 hxxp://209[.]146[.]124[.]181:8030/bot[.]x86_64 hxxp://209[.]146[.]124[.]181:8030/JrLinux hxxp://209[.]146[.]124[.]181:8030/Linux2[.]4 hxxp://209[.]146[.]124[.]181:8030/Linux2[.]6 hxxp://209[.]146[.]124[.]181:8030/taskhost[.]exe hxxp://oss[.]17ww[.]vip/21929e87-85ff-4e98-a837-ae0079c9c860.txt/test.sh hxxp://oss[.]17ww[.]vip/21929e87-85ff-4e98-a837-ae0079c9c860.txt/sshd hxxp://ec2-54-191-168-81[.]us-west-2.compute.amazonaws.com/css/linuxsys hxxp://ec2-54-191-168-81[.]us-west-2.compute.amazonaws.com/css/config.json hxxp://ec2-13-250-11-113[.]ap-southeast-1.compute.amazonaws.com/css/linuxsys hxxp://ec2-13-250-11-113[.]ap-southeast-1.compute.amazonaws.com/css/config.json hxxp://95[.]85[.]93[.]196:80/h4 hxxp://112[.]133[.]194[.]254/cron.sh hxxp://112[.]133[.]194[.]254/check.sh hxxp://112[.]133[.]194[.]254/config.sh IP ADDRESS/HOSTNAME 181[.]214[.]58[.]14:18201 47[.]253[.]46[.]11 secure[.]systemupdatecdn[.]de 188[.]214[.]27[.]50 bots[.]gxz[.]me 209[.]146[.]124[.]181 sdfasdfsf[.]9527527[.]xyz:3333 gsdasdfadfs[.]9527527[.]xyz:3333 pool[.]supportxmr[.]com:80 95[.]85[.]93[.]196:4443 pool[.]supportxmr[.]com:3333 59[.]59[.]59[.]59 WALLET 49VQVgmN9vYccj2tEgD7qgJPbLiGQcQ4uJxTRkTJUCZXRruR7HFD7keebLdYj6Bf5xZKhFKFANFxZhj3BCmRT9pe4NG325b+50000 41qqpRxT7ocGsbZPeU9JcbfRiHLy3j8DWhdKzv8Yr2VS1QPcFLmfHVJFWEBDfWaB3N6HxuVuAb73nES36bN2rhevGnZ12nA SHA256HASH b80e9466b7bb42959c29546b8c052e67fcaa0f591857617457d5d28348bd8860 d9e8b390f8e2e8a6c2308c723a6a812f59c055ecad4e9098a120e5c4c65d3905 79c9532fb6ef2742e207498bfe2b2ee09aa9773376ac0e56085083aab17b98be 5cc7e35254347f705422800bfb7fe29c6002e2537f6bac0ff996a720dfb5f48e fabbb4611fb9df5d8f208d9353be0b73c3942fe78903da096cbfe2f47c9e3566 1588bee7db42495ba7e6e34d217e6b82c5ab93f27c1eea68435cbb9e7792f9be e8b0f5a952f07c83c4d67809ac0715c7164d518323d8038542e84aab8456db43 3c73ebc7a85accc65c9ee5bf151f70b990e5a12f27a843ca21c0f9d9a10fd17d 9bf642a7e14f0a0b0a784f00a0d1cf590ac60ae5ae378d29d435519f4d9dbf2b 994b924b00fb56e12a6a987c4cdf65dd05a221c47b5fc0a7a2babf1f05c2ed38 c226744b40e8f5d2cf95b4fb2537ff00e222ecc2d24c5096ecfadb14b4a47f97 96cf27a66b629d2b19708c6887441a8422b40dc0e9e7c5c0f2212efe0b6b3323 b3a015b6650ec9800fa878ff9a5f732013806c8dcb0e7069515dae0dd380fda4 50b7e615b8cdc45486b6ed1c1c081c7a92c262edb84318fa864531dcab753f82 f7b97677b6387c1f02d429e98868bf6973a8dec14dfee2516a27e885d6b1c780 b60d7fb66caf103a04e81fb89dbb05111b4b0ef513f3769c8e0a8106ab01a075 a9e7b5284182d3881c865895ee6e0fb03273eec3dcbf4bfc82dd2b069245beae c3101b0b74d76a95ba91b6cc4945657e928d2dac8fdf926ffbf09031d46e9186 b67ab1b9b66fdc2c4ed1689698a54a347c2bdd6eaff87039ae337675243670d8 83fb74bb852bbd722e6ebc4e249e49cb4bb4194493a26d62d4bfcdfca2998412 53994a35a57970dea48e97009f65ad045b69a83234b771b106446211376a6866 f3d3572ef96c9c59e137425ca6804e1b86b7f8b57210a3724d567017460774de 1af8e068aa7377f0055640af581a412aa9d7288c912a93dd0d739657af0079fb 1abd8cbd64d1d9c8d56b7ea6273ed62e1471f300fabc67dbc2416a48e2faf33d addccd0ecb643251af2e79e878b19a8e9c8f1c87302e732ef057cdba821f4b30 d9dfe98b5fba09e17dbe29dfeb8deb7d777d4a3b0d670914691ed360b916116a d9dfe98b5fba09e17dbe29dfeb8deb7d777d4a3b0d670914691ed360b916116a 8d3440301bc94ed83cdafb69e4b0166d3a0020eb4f38e9fa159c2f13f14b2d29 a13a979f4ca57450528bb6cd7aa2bf47d2eea211053eb1a14b8c4a44fd661831 7194ec436231c2a383ffc7c75eef4f5b5a952c18fa176ffd0830667835a80533 20d97f144bf7b1662a13ac537715126b9b2f68eff46a4a09234743ae236f0177 d72e4cabffc84a31e50caf827b6e579cf6e4932e5cbc528a65a68728ba56b65b 5abf8a52d45f6d5970fab8d1dfd05b6ee7b0ef57df935f45761b89d3522fa592 24e80d66759b1c7a075aeb4fe0321eb6ac49eaf509089fd2882874ec6228d085 7355cc094f2e43e4dd7b8b698b559abe6d2d74cc48f5cfa464424314c6e41944 689504850db842365cd47eadd2d3d42888b9261e7d9e884f14bb7deeb21bb61d 762707f2c7fc4731c4c46ecb3364a4e7ace8984aa899cc57c624b342d3efa03f 4234eb5eb42fbe44d7163c4388d263b3fe57fb1e56bf56152ac352c3fd0beec0 373734730d8414d32883ebbd105c7a7c58397df995759c4e0bd367f2523d302d d1d25730122f8bc125251832c6af03aedd705dfcc2d9eebcce4371c54bb84b39 3dce929b1c091abac3342788624f1ffa4be5d603eec4d7ab39b604694ac05d22 eb2f95bb2059a3690259f2c0d7537b3cad858869650b9c220d2d81e3720b6dde 2e0e324e36fafe71f5d2bcf521e6415dafbc3f1173ad77f1f3daa77bb581da5f 5d9eb83b4a6f2d49580e1658263eb972be336a2cad15a84561d17d59391191b0 75d7b6264f5a574bc75400c9d57282e9344d8b2df576ad2a36ab7e2575d5a395 e5e5122ba6d0b06f7ed8e57ab5324ae730970c0d23913f27b9ecc9094182c03d 275302d03a4378f1b852e6d783d3181c2899ae0e9ebad4c7160221320863c425 653a4ad0b00e59a01142f899b6aac9712cfb25063b5b9b2e7e3171f7f3a897ed 8fad39ec0671d9b401712ddbc1f24942b2ee2f4865b6ffcd2f019036e03cbade c8b76b63644d2946fd0af72b48fa59f07a78e1f84464cff5e9b1ca4110e6113e 3928c5874249cc71b2d88e5c0c00989ac394238747bb7638897fc210531b4aab 7d052cffcf97b303d11c5d35fa9bc860155601cdea21e38447401571b35d2db1 c81d4770e812ddc883ead8ff41fd2e5a7d5bc8056521219ccf8784219d1bd819 bf56711bbe0b1dac3b1481d36e7ae2f312da5f404c554c2c45a01fe591b8464d 5c9722d3dc72dbeafec00256887867bad46d347a5fc797d57fc9e0fd317035d3 3369ddc627282eb38346e1a56118026dd3ccdb29b18ffff88ecf3663296ee6da Tags: Cara Lin RELATED POSTS FortiGuard Labs Threat Research NEW BANKING TROJAN “CHAVECLOAK” TARGETS BRAZIL FortiGuard Labs Threat Research SCRUBCRYPT DEPLOYS VENOMRAT WITH AN ARSENAL OF PLUGINS FortiGuard Labs Threat Research DECEPTIVE CRACKED SOFTWARE SPREADS LUMMA VARIANT ON YOUTUBE * * * * * * NEWS & ARTICLES * News Releases * News Articles SECURITY RESEARCH * Threat Research * FortiGuard Labs * Threat Map * Ransomware Prevention CONNECT WITH US * Fortinet Community * Partner Portal * Investor Relations * Product Certifications COMPANY * About Us * Exec Mgmt * Careers * Training * Events * Industry Awards * Social Responsibility * CyberGlossary * Sitemap * Blog Sitemap CONTACT US * (866) 868-3678 Copyright © 2024 Fortinet, Inc. All Rights Reserved Terms of Services Privacy Policy | Cookie Settings PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * ADVERTISING COOKIES YOUR PRIVACY A website may store or retrieve certain information about your browser by using cookies. Cookies store information about how a visitor interacts with a website. The information may be about you, your preferences, your browser, or may be used just to make the website function. We allow certain advertising and analytics partners to collect information from our site through cookies and similar technologies to deliver ads which are more relevant to you, and assist us with advertising-related analytics (e.g., measuring ad performance, optimizing our ad campaigns). This may be considered "selling" or "sharing” / disclosure for targeted online advertising under certain laws. To opt out of these activities, move the toggles for "Performance" and "Advertising" to the left and press "Confirm My Choices." You can also click on the different category headings if you would like to read more about the cookies that we use, and adjust your preferences. Please note that your choice will apply only to your current browser/device. You can choose not to allow some types of cookies; however, please note that blocking some categories of cookies may impact your experience of the site. You can visit our Privacy Policy for more information. privacy policy STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the basic functionality of the website. The website would not work without these cookies, so they cannot be switched off in our systems. You can set your browser to block or alert you about these cookies, but some parts of the site will not work. PERFORMANCE COOKIES Performance Cookies These cookies help us collect certain data, such as count visits and traffic sources, so that we can measure the performance of our site, improve the content, and build better features that enhance your experience. They help us to know which pages are the most and least popular and see how visitors move around the site. They also allow us to measure the effectiveness of our ads on other sites. FUNCTIONAL COOKIES Functional Cookies These cookies allow our website to remember your preferences and choices made on the website, such as region and language, which help us provide enhanced functionality and personalization. These cookies may be set by us or by third party providers whose services we have added to our pages. If you disable these cookies, then some or all of these features may not function properly. ADVERTISING COOKIES Advertising Cookies These cookies may be set through our website by our advertising partners, and use information uniquely identifying your browser and internet device to build a profile of your interests and show you relevant ads on other websites. If you disable these cookies, you will experience less targeted advertising. BACK BUTTON BACK Vendor Search Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1