HomeMalware & ThreatsBackdoor.Win32.Agent.amt MVID-2024-0673 Authentication Bypass / Code Execution

Backdoor.Win32.Agent.amt MVID-2024-0673 Authentication Bypass / Code Execution

Published on

spot_img

In recent news, a new threat has been identified by cybersecurity researcher Malvuln, also known as John Page or hyp3rlinx. The threat, known as Backdoor.Win32.Agent.amt, has been found to exploit an Authentication Bypass vulnerability that allows malicious actors to gain unauthorized access to infected systems.

The malware associated with this threat is capable of running an FTP server on TCP port 2121. This FTP server allows third-party attackers to log in using any username and password combination. Once access is gained, intruders can upload executable files using FTP commands such as PASV and STOR, potentially leading to remote code execution on the compromised system.

Identified as part of the Agent family of malware, the type of this threat is classified as PE32. The MD5 hash associated with this particular malware sample is 2a442d3da88f721a786ff33179c664b7. The vulnerability is tracked under the ID MVID-2024-0673, with the disclosure date listed as 02/28/2024.

An exploit or Proof of Concept (PoC) has been provided, demonstrating the steps an attacker could take to upload a malicious executable file to an infected system using the FTP server set up by the malware. By connecting to the FTP server and using commands like USER, PASS, PASV, and STOR, the attacker can transfer the malicious file and potentially execute remote code on the target system.

It is crucial for organizations and individuals to be aware of this threat and take necessary precautions to protect their systems. This includes implementing strong authentication mechanisms, monitoring network traffic for any suspicious activity on port 2121, and ensuring that systems are regularly patched and updated to prevent exploitation of known vulnerabilities.

In conclusion, the discovery of the Backdoor.Win32.Agent.amt threat highlights the ever-evolving landscape of cyber threats and the importance of proactive cybersecurity measures. By staying informed and taking appropriate security measures, individuals and organizations can better defend against malicious attacks and safeguard their sensitive information.

Source link

Latest articles

CBI and FBI collaborate to dismantle global cyber fraud ring in Delhi-NCR, leading to arrest of 43 individuals | Delhi News

The Central Bureau of Investigation (CBI) has recently made a significant breakthrough in dismantling...

Hacktivists Alleged Leak of CrowdStrike Threat Intelligence

A recent cyber incident has put cybersecurity firm CrowdStrike in the spotlight, as a...

Malicious PyPi Package Steals Google Cloud Credentials from macOS Developers

Researchers have recently discovered a peculiar Python code package online designed to pilfer Google...

MonoSwap Security Breach, Users Advised to Withdraw Funds Promptly

MonoSwap, a decentralized crypto exchange (DEX), has recently issued a warning to its users...

More like this

CBI and FBI collaborate to dismantle global cyber fraud ring in Delhi-NCR, leading to arrest of 43 individuals | Delhi News

The Central Bureau of Investigation (CBI) has recently made a significant breakthrough in dismantling...

Hacktivists Alleged Leak of CrowdStrike Threat Intelligence

A recent cyber incident has put cybersecurity firm CrowdStrike in the spotlight, as a...

Malicious PyPi Package Steals Google Cloud Credentials from macOS Developers

Researchers have recently discovered a peculiar Python code package online designed to pilfer Google...
en_USEnglish