Skip to content

Intruders exploiting Apache ActiveMQ vulnerability seal the breach once inside, mending a critical flaw

Uninvited guests sought to remain inconspicuous in the environment

Intruders who infiltrated Apache ActiveMQ have patched a critical vulnerability following their...
Intruders who infiltrated Apache ActiveMQ have patched a critical vulnerability following their unauthorized access.

Intruders exploiting Apache ActiveMQ vulnerability seal the breach once inside, mending a critical flaw

In recent developments, cybercriminals have been actively exploiting a critical vulnerability (CVE-2023-46604) in the open source Apache ActiveMQ middleware. This remote code execution (RCE) flaw, rated as a perfect 10 by Apache, has been a cause for concern since it was patched way back in late October 2023.

Despite the patch being available for over a year, a significant number of vulnerable systems remain, due to IT departments being perpetually overstretched when it comes to patching. This situation has allowed attackers to capitalise on the flaw, gaining root access to target machines by modifying the sshd configuration file with a Sliver implant.

Once they have established persistence on Linux servers, the attackers download two Java Archive (JAR) files to patch the original vulnerability. One of these malware variants is DripDropper, a new form of Linux malware that is password protected, making it harder for researchers to access and analyze.

The Red Canary team has published a report detailing their findings about DripDropper. According to Brian Donohue, a principal researcher at Red Canary, this type of behaviour is rare and customised.

Attackers deliver new payloads after installing malware on the system, which could include uploading information-stealing code, installing ransomware, or downloading network access tools. DripDropper establishes persistent execution by modifying the 0anacron file in each /etc/cron.*/ directory.

The current status of the CVE-2023-46604 vulnerability is that it remains actively exploited by threat actors in the wild, particularly targeting cloud Linux environments. This ongoing exploitation underscores the critical need for timely patching and multi-layered defence strategies, especially for cloud-based and Linux systems running Apache ActiveMQ.

To protect systems, organisations should apply patches immediately, restrict network access, monitor for suspicious activity, deploy security controls, conduct logging and auditing, and consider using Endpoint Detection and Response (EDR) tools, Web Application Firewalls (WAFs), and threat hunting for Indicators of Compromise (IOCs) related to this vulnerability and malware.

[1] Red Canary Report: DripDropper Linux Malware [2] Oracle's tardy software fixes and the need to rethink security strategies [3] Apache ActiveMQ Vulnerability (CVE-2023-46604) Patch Released [4] DripDropper: A New Linux Malware on the Block [5] The Impact of CVE-2023-46604 Exploitation on Cloud Linux Environments

Read also:

Latest

Study Results Released on COMP360 Psilocybin for PTSD in Phase 2 Trial by Compass Pathways

Study Results Revealed: Compass Pathways' Phase 2 Trial of COMP360 Psilocybin for Post-Traumatic Stress Disorder Shows Positive Outcomes

Single 25 mg dose of COMP360 psilocybin, administered in an open-label Phase 2 study, demonstrated good tolerability, with no severe adverse events reported. Positive effects, including prompt and enduring symptom improvement from baseline, were noticed up to 12 weeks after a single...