Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    What's Hot

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Home»Cyber Security»Cyberattackers Swarm OpenFire Cloud Servers With Takeover Barrage
    Cyber Security

    Cyberattackers Swarm OpenFire Cloud Servers With Takeover Barrage

    justmattgBy justmattgAugust 31, 2023No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    [ad_1]

    The Kinsing cybercrime group is back with a new attack vector: Pummeling a previously disclosed path traversal flaw in the Openfire enterprise messaging application to create unauthenticated admin users. From there, they gain full control of Openfire cloud servers, and can upload the malware and a Monero cryptominer to compromised platforms.

    Researchers from Aqua Nautilus have observed more than 1,000 attacks in less than two months that exploit the Openfire vulnerability, CVE-2023-32315, which was disclosed and patched in May, they revealed in a blog post this week. However, just last week the CISA added the flaw to its catalog of known exploited vulnerabilities.

    Openfire is a Web-based real-time collaboration (RTC) server used as a chat platform over XMPP that supports more than 50,000 concurrent users. By design, it’s supposed to be a secure and segmented way for enterprise users to communicate across departments and across remote work locations.

    The flaw, however, makes Openfire’s administrative console vulnerable to path traversal attack via its setup environment, allowing an unauthenticated, regular user to access pages in the console reserved for administrative users.

    Attackers have been doing just that, authenticating themselves as administrators to upload malicious plugins and eventually take over control of the Openfire server for the purpose of mining crypto, according to Aqua Nautilus. Kinsing is a Golang-based malware best known for its targeting of Linux; however, Microsoft researchers recently observed an evolution in its tactics to pivot to other environments.

    “This Kinsing campaign exploits the vulnerability, drops in runtime Kinsing malware and a cryptominer, [and] tries to evade detection and gain persistence,” Aqua Nautilus security data analyst Nitzan Yaakov and lead data analyst Assaf Morag wrote in the post.

    Technical Details on Kinsing Attacks on OpenFire

    Aqua Nautilus researchers created an Openfire honeypot in the beginning of July that they said immediately was targeted, with 91% of attacks attributed to the Kinsing campaign. Specifically, they discovered two types of attacks, the most prevalent one of which deploys a Web shell and enables the attacker to download Kinsing malware and cryptominers. Indeed, taking over cloud servers for the purpose of cryptomining has been a hallmark of the Kinsing group.

    In the latest Kinsing attacks, the threat actors exploit the vulnerability to create a new admin user and upload a plugin, cmd.jsp, which was designed to deploy the Kinsing malware payload. Once this is done, attackers proceed with a valid authentication process for the Openfire Administration Panel, gaining complete access as an authenticated admin user and ultimately giving them free rein over the app and the server on which it’s running.
    Next, attackers upload a Metasploit exploit in a .ZIP file, which extends the plugin to enable http requests at their disposal, allowing them to download Kinsing, which is hard-coded in the plugin, the researchers said.

    The malware then communicates with command-and-control and downloads a shell script as a secondary payload that creates persistence on the server, allowing for further attack activity, which includes the deployment of a Monero cryptominer.

    The second, less prevalent attack that the researchers observed in their honeypot involves the same Metasploit exploit. However, so far attackers only used this vector to collect system info and have not proceeded further, the researchers said.

    How Can Enterprises Secure the OpenFire Environment?

    A Shodan search turned up 6,419 Internet-connected servers with the Openfire service running, 5,036 of which were reachable. Of those, 984, or 19.5%, were vulnerable to the CVE-2023-32315 flaw; these are located mainly in the US, China, and Brazil. 

    There could be many more systems at risk, however, from attackers who gain access to the environment in other ways. Aqua Nautilus is urging administrators of any enterprise system with Openfire deployed to identify if their instance is vulnerable, and patch and secure as appropriate. To help do this, the researchers provided screenshots that show their own validation process in the blog post.

    Enterprises also should steer clear of employing default settings and ensure that passwords adhere to best practices, with a regular refresh of both secrets and passwords to further bolster the security of environments.

    Additionally, since threat actors are progressively refining their tactics and masking malicious activity in what appears to be legitimate operations, enterprises should deploy runtime detection and response solutions to identify anomalies and issue alerts about malicious activities, the researchers said.

    [ad_2]

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleEarth Estries’ Espionage Campaign Targets Governments and Tech Titans Across Continents
    Next Article A Gateway to Espionage and Ransomware Operations
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Demo
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    [mc4wp_form id=3515]
    Demo
    Top Posts

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Latest Reviews
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    justmattgApril 16, 2024

    [ad_1] Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” takeover…

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Demo
    MOST POPULAR

    Name That Toon: Last Line of Defense

    April 16, 2024

    California mountain lion P-22 left mark on wildlife conservation

    January 1, 2023

    Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

    January 1, 2023
    OUR PICKS

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑