• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers deploy "submarine" backdoor in barracuda email security gateway attacks

Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks

You are here: Home / General Cyber Security News / Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks
July 29, 2023

The U.S. Cybersecurity and Infrastructure Security Company (CISA) on Friday disclosed facts of a “novel persistent backdoor” named SUBMARINE deployed by danger actors in relationship with the hack on Barracuda Email Security Gateway (ESG) appliances.

“SUBMARINE contains a number of artifacts — which includes a SQL set off, shell scripts, and a loaded library for a Linux daemon — that jointly help execution with root privileges, persistence, command and regulate, and cleanup,” the company explained.

The conclusions occur from an investigation of malware samples obtained from an unnamed firm that had been compromised by threat actors exploiting a critical flaw in ESG devices, CVE-2023-2868 (CVSS score: 9.8), which makes it possible for for remote command injection.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Evidence gathered so significantly displays that the attackers behind the activity, a suspected China nexus-actor tracked by Mandiant as UNC4841, leveraged the flaw as a zero-working day in Oct 2022 to attain first accessibility to victim environments and implanted backdoors to create and retain persistence.

To that end, the an infection chain associated sending phishing emails with booby-trapped TAR file attachments to set off exploitation, main to the deployment of a reverse shell payload to create communication with the danger actor’s command-and-management (C2) server, from wherever a passive backdoor acknowledged as SEASPY is downloaded for executing arbitrary instructions on the machine.

SUBMARINE, also codenamed DEPTHCHARGE by the Google-owned danger intelligence agency, is the most current malware relatives to be learned in connection with the operation, which resides in a Structured Query Language (SQL) database on the ESG appliance.

Impending WEBINARShield Versus Insider Threats: Master SaaS Security Posture Management

Concerned about insider threats? We’ve got you covered! Join this webinar to take a look at practical approaches and the techniques of proactive security with SaaS Security Posture Management.

Be part of Currently

It is believed to have been “deployed in reaction to remediation efforts,” echoing Mandiant’s characterization of the adversary as an aggressive actor capable of promptly altering their malware and employing added persistence mechanisms in an try to sustain their access.

The agency further more mentioned it “analyzed artifacts associated to SUBMARINE that contained the contents of the compromised SQL databases,” and that it “poses a serious danger for lateral movement.”

Uncovered this article interesting? Observe us on Twitter  and LinkedIn to go through more special content material we article.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «ivanti warns of another endpoint manager mobile vulnerability under active Ivanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active Attack
Next Post: Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse apple sets new rules for developers to prevent fingerprinting and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.