• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers deploy "submarine" backdoor in barracuda email security gateway attacks

Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks

You are here: Home / General Cyber Security News / Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks
July 29, 2023

The U.S. Cybersecurity and Infrastructure Security Company (CISA) on Friday disclosed facts of a “novel persistent backdoor” named SUBMARINE deployed by danger actors in relationship with the hack on Barracuda Email Security Gateway (ESG) appliances.

“SUBMARINE contains a number of artifacts — which includes a SQL set off, shell scripts, and a loaded library for a Linux daemon — that jointly help execution with root privileges, persistence, command and regulate, and cleanup,” the company explained.

The conclusions occur from an investigation of malware samples obtained from an unnamed firm that had been compromised by threat actors exploiting a critical flaw in ESG devices, CVE-2023-2868 (CVSS score: 9.8), which makes it possible for for remote command injection.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Evidence gathered so significantly displays that the attackers behind the activity, a suspected China nexus-actor tracked by Mandiant as UNC4841, leveraged the flaw as a zero-working day in Oct 2022 to attain first accessibility to victim environments and implanted backdoors to create and retain persistence.

To that end, the an infection chain associated sending phishing emails with booby-trapped TAR file attachments to set off exploitation, main to the deployment of a reverse shell payload to create communication with the danger actor’s command-and-management (C2) server, from wherever a passive backdoor acknowledged as SEASPY is downloaded for executing arbitrary instructions on the machine.

SUBMARINE, also codenamed DEPTHCHARGE by the Google-owned danger intelligence agency, is the most current malware relatives to be learned in connection with the operation, which resides in a Structured Query Language (SQL) database on the ESG appliance.

Impending WEBINARShield Versus Insider Threats: Master SaaS Security Posture Management

Concerned about insider threats? We’ve got you covered! Join this webinar to take a look at practical approaches and the techniques of proactive security with SaaS Security Posture Management.

Be part of Currently

It is believed to have been “deployed in reaction to remediation efforts,” echoing Mandiant’s characterization of the adversary as an aggressive actor capable of promptly altering their malware and employing added persistence mechanisms in an try to sustain their access.

The agency further more mentioned it “analyzed artifacts associated to SUBMARINE that contained the contents of the compromised SQL databases,” and that it “poses a serious danger for lateral movement.”

Uncovered this article interesting? Observe us on Twitter  and LinkedIn to go through more special content material we article.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «ivanti warns of another endpoint manager mobile vulnerability under active Ivanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active Attack
Next Post: Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse apple sets new rules for developers to prevent fingerprinting and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.