Categories: Cyber Security News

CISA – Hackers Breached U.S. Federal Agency via GeoServer RCE

The Cybersecurity and Infrastructure Security Agency (CISA) has revealed that threat actors infiltrated a U.S. federal civilian executive branch agency by exploiting a remote code execution vulnerability in GeoServer.

The incident, which persisted for more than three weeks, underscores the critical importance of prompt patching, rigorous incident response rehearsals, and continuous alert monitoring to safeguard public-facing infrastructure.

How the Breach Unfolded

Attackers leveraged CVE-2024-36401—an “eval injection” flaw in GeoServer—to execute arbitrary commands on a public-facing server.

Although the vulnerability was publicly disclosed 11 days earlier, the agency had not applied the patch.

Once inside, the intruders downloaded open-source reconnaissance and exploitation tools, installed web shells, and established persistence by creating cron jobs that would survive server reboots.

Less than two weeks later, the adversaries exploited the same weakness on a second GeoServer instance, expanding their foothold.

From there, they navigated to a web server and subsequently to an internal SQL server.

Using the xp_cmdshell procedure, they again achieved remote code execution.

Many of the public-facing systems lacked endpoint protection, and although endpoint detection and response (EDR) alerts had been configured, they were not continuously reviewed.

The breach remained undetected until July 31, when an EDR alert flagged a suspicious file transfer, prompting the agency’s security operations center to contain the SQL server and involve CISA.

CISA’s Key Findings

Following its investigation, CISA identified three primary shortcomings that enabled the breach to persist.

First, the agency failed to apply the GeoServer patch in a timely fashion, allowing attackers to exploit a publicly known vulnerability.

Second, the incident response plan had never been tested under realistic conditions and did not account for rapid engagement with external partners or granting them access to critical security tools.

This unpracticed plan delayed containment efforts.

Third, EDR alerts were not monitored around the clock, and several internet-facing hosts lacked any endpoint protection, preventing early warning signs from triggering an immediate response.

These findings highlight that technological controls alone are insufficient.

Effective cybersecurity demands well-developed processes and regular training so teams can respond decisively when alerts arise.

Recommendations for Federal Agencies

In its advisory, CISA urges all federal agencies and critical infrastructure organizations to prioritize three actions.

Agencies must accelerate patching of known exploited vulnerabilities, especially in systems exposed to the internet.

They should maintain and regularly exercise comprehensive incident response plans, ensuring clear procedures for involving third-party experts and providing them with necessary access.

Finally, organizations need to enhance detection capabilities by deploying comprehensive logging, centralizing log data in an out-of-band location to preserve evidence, and performing continuous threat hunting against emerging indicators of compromise.

The advisory also includes detailed tactics, techniques, and procedures used by the attackers, along with indicators of compromise available for download in STIX and JSON formats.

By reviewing these artifacts and adjusting detection rules accordingly, federal agencies can learn from this incident, fortify their defenses against similar GeoServer exploits, and bolster their overall security posture.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates

The post CISA – Hackers Breached U.S. Federal Agency via GeoServer RCE appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Fake Game Cheats on GitHub and Reddit Deliver Vidar Stealer 2.0

Cybersecurity researchers have uncovered several malware campaigns targeting gamers who search for free game cheats…

20 minutes ago

Warner selectman charged for tampering with records, questions loom over town administrator absence

Warner selectman Michael Smith was charged with tampering with public records after he replaced a…

1 hour ago

Lawyers call on four Supreme Court justices to recuse themselves in school funding appeal

A group of taxpayers who sued the state in 2022, challenging its school funding system,…

1 hour ago

Judge denies bail for therapist accused of sexually assaulting patient in Bow

A Merrimack Superior Court judge denied bail Wednesday for a therapist accused of sexually assaulting…

1 hour ago

Freeport to demolish vacant building, warns of construction impact

FREEPORT, Ill. (WTVO) — The city of Freeport is in the process of demolishing One…

4 hours ago

This website uses cookies.