Ransomware attacks are on the rise as attackers exploit a critical remote code execution vulnerability in Apache ActiveMQ. This vulnerability, tracked as CVE-2023-46604, was patched by the developers of ActiveMQ last week. However, it seems that not all users have upgraded their software, leaving them vulnerable to these attacks.
Last Friday, Rapid7 Managed Detection and Response (MDR) identified suspected exploitation of Apache ActiveMQ CVE-2023-46604 in two different customer environments. In both instances, the attackers attempted to deploy ransomware binaries on target systems in order to ransom the victim organizations. Rapid7 believes that the attackers used the HelloKitty ransomware program, whose source code was leaked on underground forums earlier this month.
Apache ActiveMQ is a popular Java open-source message broker that is used in developing enterprise software solutions. It supports various transmission protocols for transferring messages and data between different applications and clients written in different programming languages. The vulnerability in question arises from a critical Java deserialization flaw. Serialization is the process of converting data into a binary format for transmission, while deserialization is the reversal of that process at the receiving end. If the original input is not properly sanitized during deserialization, it can lead to security issues.
Java deserialization vulnerabilities have become a growing concern in recent years, affecting many projects. In the case of Apache ActiveMQ CVE-2023-46604, a remote attacker with network access to a broker can run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol. This can cause the broker to instantiate any class on the classpath, potentially leading to remote code execution.
The HelloKitty ransomware, which the attackers deployed in the recent attacks, first surfaced in 2020. It has since been used in several high-profile attacks, including one against game studio CD Projekt Red in February 2021. In that attack, the perpetrators claimed to have stolen the source code for popular games like Cyberpunk 2077, Witcher 3, and Gwent.
To protect against these attacks, users are urged to upgrade their Apache ActiveMQ software as soon as possible. Patching vulnerabilities is crucial in preventing exploitation by threat actors. Additionally, organizations should also ensure they have proper security measures in place, such as regular software updates, strong access controls, and routine backups.
The rise of ransomware attacks highlights the importance of cybersecurity vigilance, especially for organizations that handle sensitive data. Ransomware attacks can have severe consequences, leading to data loss, financial losses, and damage to an organization’s reputation. It is essential for businesses to invest in robust cybersecurity defenses and stay up to date with the latest security patches to mitigate these risks.
In conclusion, the exploitation of the Apache ActiveMQ vulnerability to deploy ransomware is a concerning development in the cybersecurity landscape. Users must promptly update their software to protect against such attacks. It serves as a reminder of the ongoing threat posed by ransomware and the need for organizations to prioritize cybersecurity measures to safeguard their networks and data.

