HomeCII/OTHackers Exploit Adobe ColdFusion Vulnerabilities for Malware Deployment

Hackers Exploit Adobe ColdFusion Vulnerabilities for Malware Deployment

Published on

spot_img

Remote attackers have discovered and exploited pre-authentication remote code execution (RCE) vulnerabilities in Adobe ColdFusion 2021, allowing them to take control of affected systems. This has put numerous users of both Windows and macOS platforms at risk. Adobe has released security patches to address these vulnerabilities, but attackers are still taking advantage of them.

The attack campaign involves multiple stages, including probing, reverse shells, and the deployment of malware. Attackers have been using tools like “interactsh” to test the effectiveness of the exploit. Through probing activities, attackers gain insights into potential vulnerabilities and lay the groundwork for more malicious actions.

In addition to probing, attackers have also utilized reverse shells to gain unauthorized access to victim systems. By encoding payloads in Base64, they are able to remotely control compromised systems.

The attack campaign has also involved the deployment of various malware strains. Four distinct malware strains have been identified: XMRig Miner, Satan DDoS/Lucifer, RudeMiner, and BillGates/Setag backdoor.

The XMRig Miner is primarily associated with Monero cryptocurrency mining. Attackers have been harnessing this malware to hijack system processing power and generate financial gain for themselves.

Lucifer, on the other hand, is a hybrid bot that combines cryptojacking and distributed denial of service (DDoS) functionalities. It showcases not only mining capabilities but also command and control operations, propagation through vulnerabilities, and sophisticated DDoS attacks.

RudeMiner, connected to Lucifer, carries a legacy of DDoS attacks from previous campaigns. Its presence in the ongoing threat landscape signifies its persistence and adaptability.

The BillGates/Setag backdoor, previously associated with Confluence Server vulnerabilities, has resurfaced in this context. It has multifaceted capabilities that encompass system hijacking, C2 communication, and diverse attack methods.

Despite the availability of security patches from Adobe, the continuous exploitation of these vulnerabilities highlights the urgency for users to take action. It is strongly advised that users upgrade their systems promptly and deploy protection mechanisms, such as antivirus services, IPS signatures, web filtering, and IP reputation tracking, to mitigate ongoing attacks.

In related news, Adobe recently reset user passwords as a precaution against data breach risks. This action was taken to ensure the security of user accounts. Additionally, Apple mistakenly approved malware disguised as Adobe Flash Player, highlighting the importance of vigilance when it comes to software updates. Fake Adobe updates have also been found to install cryptomining malware while updating Flash, further emphasizing the need for caution and verification when downloading software updates.

As the attack campaign targeting Adobe ColdFusion 2021 continues, it is crucial for users to stay vigilant and take the necessary steps to protect their systems from exploitation.

Source link

Latest articles

Claude Mythos Preview Uncovers Over 10,000 0-Days in Glasswing

Anthropic, a prominent player in the AI landscape, has recently shared significant developments regarding...

LiteSpeed cPanel Plugin CVE-2026-48172 Used for Root Script Execution

A serious security flaw affecting the LiteSpeed User-End cPanel Plugin has surfaced, raising considerable...

Malicious VS Code Extension Compromises GitHub

GitHub recently confirmed a significant security breach involving the compromise of an employee's device...

Hackers Compromise Laravel-Lang Packages in 700 GitHub Repositories

Active Supply Chain Attack Targets Laravel-Lang Open-Source Organization A sophisticated and active supply chain attack...

More like this

Claude Mythos Preview Uncovers Over 10,000 0-Days in Glasswing

Anthropic, a prominent player in the AI landscape, has recently shared significant developments regarding...

LiteSpeed cPanel Plugin CVE-2026-48172 Used for Root Script Execution

A serious security flaw affecting the LiteSpeed User-End cPanel Plugin has surfaced, raising considerable...

Malicious VS Code Extension Compromises GitHub

GitHub recently confirmed a significant security breach involving the compromise of an employee's device...