• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian hackers targeting vmware horizon log4j flaws to deploy ransomware

Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware

You are here: Home / General Cyber Security News / Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware
February 18, 2022

A “likely destructive actor” aligned with the government of Iran is actively exploiting the nicely-recognized Log4j vulnerability to infect unpatched VMware Horizon servers with ransomware.

Cybersecurity business SentinelOne dubbed the group “TunnelVision” owing to their significant reliance on tunneling instruments, with overlaps in techniques noticed to that of a broader team tracked under the moniker Phosphorus as very well as Charming Kitten and Nemesis Kitten.

Automatic GitHub Backups

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“TunnelVision pursuits are characterized by broad-exploitation of 1-working day vulnerabilities in concentrate on regions,” SentinelOne scientists Amitai Ben Shushan Ehrlich and Yair Rigevsky claimed in a report, with the intrusions detected in the Middle East and the U.S.

Also observed along with Log4Shell is the exploitation of Fortinet FortiOS path traversal flaw (CVE-2018-13379) and the Microsoft Exchange ProxyShell vulnerability to attain original accessibility into the concentrate on networks for post-exploitation.

“TunnelVision attackers have been actively exploiting the vulnerability to run malicious PowerShell instructions, deploy backdoors, make backdoor consumers, harvest qualifications and carry out lateral motion,” the researchers claimed.

Prevent Data Breaches

The PowerShell commands are utilized as a launchpad to obtain equipment like Ngrok and operate even more commands by implies of reverse shells that are employed to fall a PowerShell backdoor that is able of accumulating credentials and executing reconnaissance commands.

SentinelOne also said it identified similarities in the system employed to execute the reverse web shell with another PowerShell-based mostly implant named PowerLess that was disclosed by Cybereason researchers previously this thirty day period.

All via the activity, the threat actor is reported to have utilized a GitHub repository recognised as “VmWareHorizon” below the username “protections20” to host the destructive payloads.

The cybersecurity business stated it is really associating the attacks to a different Iranian cluster not mainly because they are unrelated, but owing to the truth that “there is at existing insufficient knowledge to treat them as equivalent to any of the aforementioned attributions.”

Uncovered this write-up appealing? Abide by THN on Fb, Twitter  and LinkedIn to go through far more unique material we post.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «4 cloud data security best practices all businesses should follow 4 Cloud Data Security Best Practices All Businesses Should Follow Today
Next Post: New Linux Privilege Escalation Flaw Uncovered in Snap Package Manager new linux privilege escalation flaw uncovered in snap package manager»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.