Article Details

Original Article Text

Click to Toggle View

TellYouThePass ransomware joins Apache ActiveMQ RCE attacks. Internet-exposed Apache ActiveMQ servers are also targeted in TellYouThePass ransomware attacks targeting a critical remote code execution (RCE) vulnerability previously exploited as a zero-day. The flaw, tracked as CVE-2023-46604, is a maximum severity bug in the ActiveMQ scalable open-source message broker that enables unauthenticated attackers to execute arbitrary shell commands on vulnerable servers. While Apache released security updates to fix the vulnerability on October 27, cybersecurity companies ArcticWolf and Huntress Labs found that threat actors have been exploiting it as a zero-day to deploy SparkRAT malware for over two weeks, since at least October 10. According to data from the threat monitoring service ShadowServer, there are currently more than 9,200 Apache ActiveMQ servers exposed online, with over 4,770 vulnerable to CVE-2023-46604 exploits. Since Apache ActiveMQ is used as a message broker in enterprise environments, applying the security updates should be considered time-sensitive. Admins are advised to patch all vulnerable systems immediately by upgrading to ActiveMQ versions 5.15.16, 5.16.7, 5.17.6, and 5.18.3. Targeted by ransomware gangs One week after Apache patched this critical ActiveMQ vulnerability, Huntress Labs and Rapid7 both reported spotting attackers exploiting the bug to deploy HelloKitty ransomware payloads on customers' networks. The attacks observed by both cybersecurity companies' security researchers started on October 27, just days after Apache released security patches. Arctic Wolf Labs revealed in a report published one day later that threat actors actively exploiting the CVE-2023-46604 flaw also use it for initial access in attacks targeting Linux systems and pushing TellYouThePass ransomware. The security researchers also found similarities between the HelloKitty and TellYouThePass attacks, with both campaigns sharing "email address, infrastructure, as well as bitcoin wallet addresses." "Evidence of exploitation of CVE-2023-46604 in the wild from an assortment of threat actors with differing objectives demonstrates the need for rapid remediation of this vulnerability," Arctic Wolf researchers warned. TellYouThePass ransomware has seen a massive and sudden spike in activity after Log4Shell proof-of-concept exploits were released online two years ago. With its return as a Golang-compiled malware in December 2021, the ransomware strain also added cross-platform targeting capabilities, making it possible to attack Linux and macOS systems (macOS samples are yet to be spotted in the wild).

Daily Brief Summary

CYBERCRIME // Vulnerability CVE-2023-46604 in Apache ActiveMQ Exploited to Deploy Ransomware

Cybersecurity companies ArcticWolf and Huntress Labs report that a critical remote code execution (RCE) flaw in Apache ActiveMQ servers is being exploited over the last two weeks by attackers to deploy SparkRAT malware.

This flaw, known as CVE-2023-46604, is a maximum severity bug affecting the ActiveMQ open-source message broker, enabling unauthenticated actors to execute arbitrary commands on vulnerable servers.

More than 4,770 Apache ActiveMQ servers out of over 9,200 exposed online, are currently vulnerable to CVE-2023-46604 exploits.

Apache has released security updates to fix this vulnerability which system admins are strongly advised to apply immediately.

Attackers have been exploiting this bug to deploy both HelloKitty and TellYouThePass ransomware payloads on networks, with similarities noted between the two different campaigns.

The resurgence of TellYouThePass ransomware, which has expanded its targeting capabilities to include Linux and macOS systems, underscores the need for rapid resolution of this vulnerability.