The campaign demonstrates counterintuitive behavior where adversaries “fix” compromised systems after gaining remote access.
This dual-purpose strategy effectively locks out competing adversaries while obscuring the initial access technique, showcasing advanced operational security considerations in modern cyber warfare.
Red Canary detected adversaries executing reconnaissance commands on dozens of cloud-based Linux endpoints vulnerable to the critical remote code execution vulnerability CVE-2023-46604 in Apache ActiveMQ.
This widely-deployed open source message broker has been previously exploited for deploying TellYouThePass, Ransomhub, and HelloKitty ransomware variants, alongside Kinsing cryptomining malware.
The adversaries deployed a varied command and control infrastructure, including Sliver implants and Cloudflare Tunnels for covert long-term access.
After exploiting endpoints and installing Sliver implants, attackers modified existing SSH daemon configurations to enable root login capabilities, typically disabled by default in modern Linux distributions.
Under elevated SSH sessions, adversaries downloaded and executed a previously unknown downloader designated “DripDropper”.
This encrypted PyInstaller ELF file requires password authentication for execution, effectively hindering automated sandbox analysis.
DripDropper communicates with adversary-controlled Dropbox accounts using hardcoded bearer tokens, leveraging legitimate cloud platforms for command and control operations.
The malware establishes persistence by modifying anacron configuration files across /etc/cron.*/ directories and altering SSH configuration files, including changing the default login shell for the games user account to /bin/sh.
This modification prepares systems for additional persistent access vectors through seemingly innocuous user accounts.
Following initial compromise, adversaries downloaded legitimate ActiveMQ JAR files from Apache Maven repositories, constituting an official patch for CVE-2023-46604.
By replacing existing vulnerable JAR files, attackers effectively remediated the exploited vulnerability, reducing detection probability through vulnerability scanners and preventing exploitation by competing threat actors.
| Component | Technical Details |
|---|---|
| Vulnerability | CVE-2023-46604 (Apache ActiveMQ RCE) |
| EPSS Score | 94.44% exploitation probability (30 days) |
| Malware Type | Encrypted PyInstaller ELF |
| C2 Infrastructure | Dropbox, Sliver, Cloudflare Tunnels |
| Persistence Methods | SSH configuration modification, anacron scheduling |
| Target Environment | Cloud-based Linux endpoints |
This campaign underscores the sophistication of modern Linux-targeted operations, where adversaries implement multi-layered persistence mechanisms before self-remediating initial access vectors.
Organizations must implement policy-based SSH management, proactive vulnerability patching, network ingress controls, and comprehensive cloud logging to defend against such advanced persistent threats effectively.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Hackers Exploiting Apache ActiveMQ Flaw to Breach Cloud-Based Linux Systems appeared first on Cyber Security News.
Slay the Spire 2 developer Mega Crit has published a detailed roadmap for Slay the…
A new weekend has arrived, and today, you can save big on the 4K Movies,…
Resident Evil Requiem fans believe next month’s mysterious content update will add a new version…
Wrestlemania 42 is finally here, and I’m here in Las Vegas at Allegiant Stadium to…
Game of Thrones alum Charles Dance has reportedly entered talks to join The Batman Part…
Tension: We crave sustainable food innovation yet recoil from eating anything that didn’t come from…
This website uses cookies.