FBI: Cuba ransomware breached 49 US critical infrastructure orgs
Researchers discover 14 new data-stealing web browser attacks
Microsoft Edge now bashes Google Chrome when you download it
Russian internet watchdog announces ban of six more VPN products
Malicious KMSPico installers steal your cryptocurrency wallets
Microsoft shares fix for broken Outlook search in Windows 11
Microsoft reverses Windows 11’s annoying default browser setting changes
This CompTIA cybersecurity training is only $9 in a Cyber Week deal
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
An advanced persistent threat (APT) group that had been exploiting a flaw in the Zoho ManageEngine ADSelfService Plus software has pivoted to leveraging a different vulnerability in another Zoho product.
The actor has been seen exploiting an unauthenticated remote code execution issue in Zoho ServiceDesk Plus versions 11305 and older, currently tracked as CVE-2021-44077.
Zoho addressed the RCE flaw on September 16, 2021, and on November 22, 2021, the company published a security advisory to alert customers of active exploitation. Users were slow to update, though, and remained vulnerable to attacks.
According to a report from Palo Alto Networks’ Unit42, there is no public proof-of-concept exploit for CVE-2021-44077, which suggests that the APT group leveraging it developed the exploit code itself and are using it exclusively for now.
The actors exploit the flaw by sending two requests to the REST API, one to upload an executable (msiexec.exe) and one to launch the payload.
This process is done remotely and requires no authentication to the vulnerable ServiceDesk server.
When ServiceDesk executes the payload, a mutex is created and a hardcoded Java module is written to “../lib/tomcat/tomcat-postgres.jar,” a variant of the ‘Godzilla’ webshell that is loaded into ServiceDesk after killing ‘java.exe’ and restarting the process.
According to the researchers, the actor used the same webshell secret key seen in the ADSelfService Plus campaign, but this time it installs as an Apache Tomcat Java Servlet Filter.
“The fact that this Godzilla webshell is installed as a filter means that there is no specific URL that the actor will send their requests to when interacting with the webshell and the Godzilla webshell filter can also bypass a security filter that is present in ServiceDesk Plus to stop access to webshell files” – reads Unit42’s analysis
“It appears that the threat actor leveraged publicly available code called tomcat-backdoor to build the filter and then added a modified Godzilla webshell to it,” the researchers note.
Palo Alto Networks has seen evidence that may connect these attacks to the Chinese APT27 group (Emissary Panda), who have previously deployed Godzilla against high-profile targets, but the clues are insufficient for clear attribution.
Organizations are strongly recommended to patch their Zoho software as soon as possible and review all files created in ServiceDesk Plus directories since early October 2021.
At this time, network scans reveal over 600 vulnerable systems in the United States and another 2,100 in India, Russia, Great Britain, Turkey, and others.
Many of those vulnerable deployments are found in government systems, universities, healthcare organizations, and other critical entities.
Update Dec 03: CISA published an alert on the exploitation of CVE-2021-44077, sharing a long list of novel IoCs which could help defenders detect and mitigate the threat.
Threat actors offer millions for zero-days, developers talk of exploit-as-a-service
New Windows zero-day with public exploit lets you become an admin
Microsoft fixes Windows CVE-2021-40444 MSHTML zero-day bug
Hacking group also used an IE zero-day against security researchers
Sitecore XP RCE flaw patched last month now actively exploited
Not a member yet? Register Now
Nine WiFi routers used by millions were vulnerable to 226 flaws
Russian internet watchdog announces ban of six more VPN products
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

Facebook disrupts operations of seven surveillance-for-hire firms

Microsoft December 2021 Patch Tuesday fixes 6 zero-days, 67 flawsNew ransomware now…

Microsoft Exchange servers hacked in internal reply-chain attacks

Microsoft: Office 365 will boost default protection for all usersMicrosoft increases Windows…

Windows 10 App Installer abused in BazarLoader malware attacks

HPE says hackers breached Aruba Central using stolen access keyFBI warns of…

Malicious Android app steals Malaysian bank credentials, MFA codes

Former Ubiquiti dev charged for trying to extort his employerNew malware hides…