• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Critical ManageEngine RCE bug now exploited to open reverse shells

Sergiu Gatlan by Sergiu Gatlan
January 20, 2023
Reading Time: 3 mins read
0
Critical ManageEngine RCE bug now exploited to open reverse shells

ManageEngine

RELATED POSTS

Sextortionists are making AI nudes from your social media images

Over 60,000 Android apps secretly installed adware for past six months

Outlook.com hit by outages as hacktivists claim DDoS attacks

A critical remote code execution (RCE) vulnerability affecting multiple Zoho ManageEngine products is now being exploited in attacks.

The first exploitation attempts were observed by cybersecurity firm Rapid7 on Tuesday, two days before Horizon3 security researchers released public exploit code and in-depth technical analysis of the flaw.

“Rapid7 is responding to various compromises arising from the exploitation of CVE-2022-47966, a pre-authentication remote code execution (RCE) vulnerability impacting at least 24 on-premise ManageEngine products,” the threat detection firm said.

“Rapid7 observed exploitation across organizations as early as January 17, 2023 (UTC).”

This was confirmed by researchers at the Shadowserver Foundation, who said they are “picking up exploitation attempts from at least 10 IPs for CVE-2022-47966 unauthenticated RCE affecting multiple Zoho ManageEngine products (that have SAML SSO enabled).”

Their findings were also confirmed by threat intelligence firm GreyNoise which began tracking CVE-2022-47966 exploitation attempts last week, on January 12.

Buy JNews
ADVERTISEMENT

GreyNoise has detected 11 IP addresses targeting Internet-exposed ManageEngine instances vulnerable to CVE-2022-47966 attacks.

At least one of these IPs (i.e., 221.226.159.22), assigned to a Linux server on China Telecom Backbone, has previously attempted to compromise servers unpatched against the Log4shell vulnerability.

IPs linked to CVE-2022-47966 exploitation
IPs linked to CVE-2022-47966 exploitation (GreyNoise)

​Post-exploitation activity on compromised devices

While investigating attacks that led to the compromise of some of its customers’ ManageEngine instances, Rapid7 also observed post-exploitation activity.

The company says the attackers are using PowerShell scripts to disable Microsoft Defender real-time protection and adding the C:UsersPublic folder to Defender’s exclusion lists.

The threat actors also deploy additional payloads, including remote access tools camouflaged as the Windows Service Host service.

One of these tools, a Golang protocol tunneling tool named Chisel that’s similar to the Plink (PuTTY Link) command-line connection tool, is being used to create a reverse ssh tunnel (likely to open a remote shell to bypass firewalls).

In one exploitation attempt seen by ShadowServer and shared with BleepingComputer, the attackers used curl to download a file from a remote server (106.246.224[.]219/hlmllmo) and execute it.

Unfortunately, this file no longer exists on the server, so there’s no info on its malicious behavior.

However, the IP address has a history of distributing Linux backdoors on compromised devices using VMware vulnerabilities and the Log4Shell flaw.

Script used to deploy additional payloads
Script used to deploy additional payloads in previous attacks (BleepingComputer)

​”Organizations using any of the affected products listed in ManageEngine’s advisory should update immediately and review unpatched systems for signs of compromise, as exploit code is publicly available and exploitation has already begun,” Rapid7 warned.

Horizon found over 8,300 Internet-exposed ServiceDesk Plus and Endpoint Central instances and warned of “spray and pray” attacks after estimating that roughly ​10% of exposed instances are also vulnerable to attacks.

CISA and the FBI have previously issued joint advisories (1, 2) to warn of state-backed threat actors exploiting ManageEngine flaws to drop web shells on the networks of organizations from multiple critical infrastructure sectors, including healthcare and financial services.

Share54Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

FBI warns of spike in ‘pig butchering’ crypto investment schemes
Cyber Security

Sextortionists are making AI nudes from your social media images

June 6, 2023
Android file manager apps infect thousands with Sharkbot malware
Cyber Security

Over 60,000 Android apps secretly installed adware for past six months

June 6, 2023
Microsoft Outlook outage prevents users from sending, receiving emails
Cyber Security

Outlook.com hit by outages as hacktivists claim DDoS attacks

June 6, 2023
Microsoft to pay $20 million for XBOX children privacy violations
Cyber Security

Microsoft to pay $20 million for XBOX children privacy violations

June 6, 2023
Dissecting the Dark Web Supply Chain: Stealer Logs in Context
Cyber Security

Dissecting the Dark Web Supply Chain: Stealer Logs in Context

June 6, 2023
Android December 2022 security updates fix 81 vulnerabilities
Cyber Security

Android security update fixes Mali GPU flaw exploited by spyware

June 6, 2023

Recommended Stories

New Dark Power ransomware claims 10 victims in its first month

New Dark Power ransomware claims 10 victims in its first month

March 25, 2023
Solana (SOL) Price Prediction 2025-2030: Will SOL reach $100 in 2030?

Solana (SOL) Price Prediction 2025-2030: Is $25-level farther than it seems?

April 19, 2023
SHIB hits bullish breakout target of $0.00001155 – Can bulls push forward

SHIB hits bullish breakout target of $0.00001155 – Can bulls push forward

April 2, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Zenit World introduces token rewards program to celebrate 80,000 registrations
  • How Bitcoin remains unfazed amid market instability
  • AmazeWallet: The world’s first Web3 smartwallet

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?