Categories: Cyber Security News

Hackers Exploiting Apache ActiveMQ Flaw to Breach Cloud-Based Linux Systems

Red Canary’s Threat Intelligence team has uncovered a sophisticated adversarial campaign where attackers exploit CVE-2023-46604 in Apache ActiveMQ to gain persistent access on cloud Linux systems, then strategically patch the exploited vulnerability to secure their foothold and evade detection from competing threat actors.

Advanced Post-Exploitation Tactics

The campaign demonstrates counterintuitive behavior where adversaries “fix” compromised systems after gaining remote access.

This dual-purpose strategy effectively locks out competing adversaries while obscuring the initial access technique, showcasing advanced operational security considerations in modern cyber warfare.

Red Canary detected adversaries executing reconnaissance commands on dozens of cloud-based Linux endpoints vulnerable to the critical remote code execution vulnerability CVE-2023-46604 in Apache ActiveMQ.

This widely-deployed open source message broker has been previously exploited for deploying TellYouThePass, Ransomhub, and HelloKitty ransomware variants, alongside Kinsing cryptomining malware.

DripDropper Technical Analysis

The adversaries deployed a varied command and control infrastructure, including Sliver implants and Cloudflare Tunnels for covert long-term access.

After exploiting endpoints and installing Sliver implants, attackers modified existing SSH daemon configurations to enable root login capabilities, typically disabled by default in modern Linux distributions.

Under elevated SSH sessions, adversaries downloaded and executed a previously unknown downloader designated “DripDropper”.

This encrypted PyInstaller ELF file requires password authentication for execution, effectively hindering automated sandbox analysis.

DripDropper communicates with adversary-controlled Dropbox accounts using hardcoded bearer tokens, leveraging legitimate cloud platforms for command and control operations.

The malware establishes persistence by modifying anacron configuration files across /etc/cron.*/ directories and altering SSH configuration files, including changing the default login shell for the games user account to /bin/sh.

This modification prepares systems for additional persistent access vectors through seemingly innocuous user accounts.

Vulnerability Patching Strategy

Following initial compromise, adversaries downloaded legitimate ActiveMQ JAR files from Apache Maven repositories, constituting an official patch for CVE-2023-46604.

By replacing existing vulnerable JAR files, attackers effectively remediated the exploited vulnerability, reducing detection probability through vulnerability scanners and preventing exploitation by competing threat actors.

Component Technical Details
Vulnerability CVE-2023-46604 (Apache ActiveMQ RCE)
EPSS Score 94.44% exploitation probability (30 days)
Malware Type Encrypted PyInstaller ELF
C2 Infrastructure Dropbox, Sliver, Cloudflare Tunnels
Persistence Methods SSH configuration modification, anacron scheduling
Target Environment Cloud-based Linux endpoints

Defensive Implications

This campaign underscores the sophistication of modern Linux-targeted operations, where adversaries implement multi-layered persistence mechanisms before self-remediating initial access vectors.

Organizations must implement policy-based SSH management, proactive vulnerability patching, network ingress controls, and comprehensive cloud logging to defend against such advanced persistent threats effectively.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

The post Hackers Exploiting Apache ActiveMQ Flaw to Breach Cloud-Based Linux Systems appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Slay the Spire 2 Roadmap Has No Release Dates So Dev Can Avoid ‘Sloppy Spire 2’

Slay the Spire 2 developer Mega Crit has published a detailed roadmap for Slay the…

1 hour ago

The Best Deals Today: Sony 4K OLED BRAVIA 8 TV, 4K Blu-ray Bundles, AirPods Pro 3, and More

A new weekend has arrived, and today, you can save big on the 4K Movies,…

2 hours ago

Resident Evil Requiem Mercenaries Rumors Heat Up After Alleged Leak

Resident Evil Requiem fans believe next month’s mysterious content update will add a new version…

3 hours ago

Wrestlemania 42: All of the Match Winners, Returns, and Surprises — Updating Live!

Wrestlemania 42 is finally here, and I’m here in Las Vegas at Allegiant Stadium to…

3 hours ago

Charles Dance in Talks to Join The Batman Part 2 as Harvey Dent’s Father

Game of Thrones alum Charles Dance has reportedly entered talks to join The Batman Part…

4 hours ago

3D-printed steaks and lab-grown burgers sound like science fiction until you realize they’re already on the menu

Tension: We crave sustainable food innovation yet recoil from eating anything that didn’t come from…

5 hours ago

This website uses cookies.