• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
initial access broker involved in log4shell attacks against vmware horizon

Initial Access Broker Involved in Log4Shell Attacks Against VMware Horizon Servers

You are here: Home / General Cyber Security News / Initial Access Broker Involved in Log4Shell Attacks Against VMware Horizon Servers
January 26, 2022

An preliminary access broker group tracked as Prophet Spider has been linked to a set of malicious pursuits that exploits the Log4Shell vulnerability in unpatched VMware Horizon Servers.

In accordance to new investigation printed by BlackBerry Investigate & Intelligence and Incident Response (IR) groups nowadays, the cybercrime actor has been opportunistically weaponizing the shortcoming to download a 2nd-phase payload onto the victimized programs.

The payloads noticed incorporate cryptocurrency miners, Cobalt Strike Beacons, and web shells, corroborating a former advisory from the U.K. Nationwide Health Service (NHS) that sounded the alarm on active exploitation of the vulnerabilities in VMware Horizon servers to fall destructive web shells and build persistence on impacted networks for stick to-on attacks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper take secure and enxrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

Log4Shell is a moniker applied to refer to an exploit impacting the well known Apache Log4j library that success in remote code execution by logging a specifically crafted string. Considering the fact that community disclosure of the flaw past month, threat actors have been swift to operationalize this new attack vector for a assortment of intrusion campaigns to get full manage of impacted servers.

BlackBerry claimed it noticed occasions of exploitation mirroring tactics, techniques, and methods (TTPs) beforehand attributed to the Prophet Spider eCrime cartel, together with the use of “C:WindowsTemp7fde” folder path to store destructive files and “wget.bin” executable to fetch more binaries as nicely as overlaps in infrastructure utilized by the team.

Log4Shell vulnerability

“Prophet Spider primarily gains access to victims by compromising vulnerable web servers, and makes use of a variety of minimal-prevalence applications to attain operational objectives,” CrowdStrike mentioned in August 2021, when the team was spotted actively exploiting flaws in Oracle WebLogic servers to get initial obtain to target environments.

Like with a lot of other initial access brokers, the footholds are sold to the highest bidder on underground community forums positioned in the dark web, who then exploit the accessibility for ransomware deployment. Prophet Spider is recognized to be active considering that at minimum May well 2017.

Prevent Data Breaches

This is far from the to start with time internet-facing techniques running VMware Horizon have arrive below attack applying Log4Shell exploits. Before this month, Microsoft identified as out a China-based operator tracked as DEV-0401 for deploying a new ransomware strain referred to as NightSky on the compromised servers.

The onslaught versus Horizon servers has also prompted VMware to urge its clients to utilize the patches promptly. “The ramifications of this vulnerability are significant for any technique, especially ones that acknowledge visitors from the open up Internet,” the virtualization expert services service provider cautioned.

“When an entry broker group usually takes curiosity in a vulnerability whose scope is so unknown, it’s a great indication that attackers see significant benefit in its exploitation,” Tony Lee, vice president of world wide companies complex operations at BlackBerry, stated.

“It really is likely that we will carry on to see legal groups checking out the possibilities of the Log4Shell vulnerability, so it really is an attack vector versus which defenders require to exercise regular vigilance,” Lee extra.

.

Observed this article interesting? Stick to THN on Fb, Twitter  and LinkedIn to examine a lot more exclusive content material we article.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «vodafone: personal data might become new currency by 2030 Vodafone: Personal data might become new currency by 2030
Next Post: Threat Actors Blanket Androids with Flubot, Teabot Campaigns threat actors blanket androids with flubot, teabot campaigns»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Sioux Falls Funds DSU Cybersecurity Lab
  • ‘CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps
  • Irish Watchdog Fines Meta $19m Over Data Breach
  • Avast Merger Raises Competition Concerns
  • Linux botnet spreads using Log4Shell flaw
  • Another Destructive Wiper Targets Organizations in Ukraine
  • New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
  • New Infinite Loop Bug in OpenSSL Could Let Attackers Crash Remote Servers
  • FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
  • Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters

Copyright © TheCyberSecurity.News, All Rights Reserved.