• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian hackers exploiting vmware rce bug to deploy 'code impact'

Iranian Hackers Exploiting VMware RCE Bug to Deploy ‘Code Impact’ Backdoor

You are here: Home / General Cyber Security News / Iranian Hackers Exploiting VMware RCE Bug to Deploy ‘Code Impact’ Backdoor
April 26, 2022

An Iranian-joined threat actor identified as Rocket Kitten has been noticed actively exploiting a not too long ago patched VMware vulnerability to attain first accessibility and deploy the Main Impact penetration tests tool on susceptible systems.

Tracked as CVE-2022-22954 (CVSS rating: 9.8), the critical issue considerations a situation of remote code execution (RCE) vulnerability impacting VMware Workspace Just one Entry and Id Manager.

CyberSecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Even though the issue was patched by the virtualization providers supplier on April 6, 2022, the organization cautioned buyers of verified exploitation of the flaw transpiring in the wild a 7 days later on.

“A destructive actor exploiting this RCE vulnerability potentially gains an unlimited attack surface,” scientists from Morphisec Labs mentioned in a new report. “This implies greatest privileged obtain into any components of the virtualized host and guest ecosystem.”

Attack chains exploiting the flaw involve the distribution of a PowerShell-centered stager, which is then employed to down load a following-stage payload called PowerTrash Loader that, in convert, injects the penetration testing tool, Core Affect, into memory for observe-on actions.

CyberSecurity

“The prevalent use of VMWare identity obtain management blended with the unfettered distant obtain this attack presents is a recipe for devastating breaches throughout industries,” the researchers said.

“VMWare buyers ought to also assessment their VMware architecture to be certain the influenced parts are not unintentionally posted on the internet, which dramatically increases the exploitation risks.”

Discovered this write-up attention-grabbing? Follow THN on Fb, Twitter  and LinkedIn to read extra unique written content we article.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «researchers report critical rce vulnerability in google's virustotal platform Researchers Report Critical RCE Vulnerability in Google’s VirusTotal Platform
Next Post: Bored Ape Yacht Club Customers Lose $3m in NFT Scam Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.