Categories: Cyber Security News

Hackers Exploiting Apache ActiveMQ Flaw to Breach Cloud-Based Linux Systems

Red Canary’s Threat Intelligence team has uncovered a sophisticated adversarial campaign where attackers exploit CVE-2023-46604 in Apache ActiveMQ to gain persistent access on cloud Linux systems, then strategically patch the exploited vulnerability to secure their foothold and evade detection from competing threat actors.

Advanced Post-Exploitation Tactics

The campaign demonstrates counterintuitive behavior where adversaries “fix” compromised systems after gaining remote access.

This dual-purpose strategy effectively locks out competing adversaries while obscuring the initial access technique, showcasing advanced operational security considerations in modern cyber warfare.

Red Canary detected adversaries executing reconnaissance commands on dozens of cloud-based Linux endpoints vulnerable to the critical remote code execution vulnerability CVE-2023-46604 in Apache ActiveMQ.

This widely-deployed open source message broker has been previously exploited for deploying TellYouThePass, Ransomhub, and HelloKitty ransomware variants, alongside Kinsing cryptomining malware.

DripDropper Technical Analysis

The adversaries deployed a varied command and control infrastructure, including Sliver implants and Cloudflare Tunnels for covert long-term access.

After exploiting endpoints and installing Sliver implants, attackers modified existing SSH daemon configurations to enable root login capabilities, typically disabled by default in modern Linux distributions.

Under elevated SSH sessions, adversaries downloaded and executed a previously unknown downloader designated “DripDropper”.

This encrypted PyInstaller ELF file requires password authentication for execution, effectively hindering automated sandbox analysis.

DripDropper communicates with adversary-controlled Dropbox accounts using hardcoded bearer tokens, leveraging legitimate cloud platforms for command and control operations.

The malware establishes persistence by modifying anacron configuration files across /etc/cron.*/ directories and altering SSH configuration files, including changing the default login shell for the games user account to /bin/sh.

This modification prepares systems for additional persistent access vectors through seemingly innocuous user accounts.

Vulnerability Patching Strategy

Following initial compromise, adversaries downloaded legitimate ActiveMQ JAR files from Apache Maven repositories, constituting an official patch for CVE-2023-46604.

By replacing existing vulnerable JAR files, attackers effectively remediated the exploited vulnerability, reducing detection probability through vulnerability scanners and preventing exploitation by competing threat actors.

Component Technical Details
Vulnerability CVE-2023-46604 (Apache ActiveMQ RCE)
EPSS Score 94.44% exploitation probability (30 days)
Malware Type Encrypted PyInstaller ELF
C2 Infrastructure Dropbox, Sliver, Cloudflare Tunnels
Persistence Methods SSH configuration modification, anacron scheduling
Target Environment Cloud-based Linux endpoints

Defensive Implications

This campaign underscores the sophistication of modern Linux-targeted operations, where adversaries implement multi-layered persistence mechanisms before self-remediating initial access vectors.

Organizations must implement policy-based SSH management, proactive vulnerability patching, network ingress controls, and comprehensive cloud logging to defend against such advanced persistent threats effectively.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

The post Hackers Exploiting Apache ActiveMQ Flaw to Breach Cloud-Based Linux Systems appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Ubiquiti Patches Critical UniFi OS Vulnerabilities Allowing Remote Privilege Escalation

Ubiquiti Networks has released urgent security updates to address a series of highly critical vulnerabilities…

15 minutes ago

Indiana State Police Investigating Shooting Following In Miami County

PERU, Ind. (WOWO) — Indiana State Police detectives are investigating a shooting that occurred late…

24 minutes ago

SK On Tennessee takes control of battery plant in Stanton as joint venture with Ford dissolves

An empty field lies next to the Tennessee Truck Center at Ford's BlueOval City campus…

29 minutes ago

Riot Games Says It ‘Would Not and Cannot’ Use Vanguard Anti-Cheat to Brick PCs After Rumors Spread

Riot Games has stepped in to squash rumors that it is using its Vanguard anti-cheat…

40 minutes ago

Save $2,400 Off the Alienware 16X Aurora RTX 5070 Gaming Laptop Loaded With 64GB of RAM and 4TB SSD

For Memorial Day, Dell is offering an Alienware 16X Aurora gaming laptop that's loaded with…

2 hours ago

Save 48% Off the Logitech G29/G920 Racing Wheel With Driving Force Shifter, Perfect for Forza Horizon 6

Forza Horizon 6 for PC and Xbox was released on May 19. This is the…

3 hours ago

This website uses cookies.