Press ESC to close

Modular Java Backdoor Dropped in Cleo Exploitation Campaign

Attribute Details
Threat Actors Unknown attackers exploiting Cleo software vulnerabilities
Campaign Overview Multi-stage attack deploying an encoded JAR payload targeting Cleo software.
Target Regions (Or Victims) Organizations using Cleo Integration Suite (Harmony, VLTrader, LexiCom) globally
Methodology Modular, multi-stage system using PowerShell and embedded JARs for exploitation, encryption, and data exfiltration
Product Targeted Cleo Integration Suite (Harmony, VLTrader, LexiCom)
Malware Reference Modular Java-based Remote Access Trojan (RAT) system with embedded classes (Cli, Dwn, Mos, Proc, SrvSlot, etc.)
Tools Used PowerShell scripts, TCP connection setup, custom JAR loader, network management classes
Vulnerabilities Exploited CVE-2024-50623 (unauthenticated vulnerability in Cleo software)
TTPs Initial Access: Exploit Public-Facing Application (T1190), Command and Scripting Interpreter (T1059)
  Discovery: System Owner/User Discovery (T1033), Domain Trust Discovery (T1482)
  Lateral Movement: Pass the Hash (T1550/002)
Attribution Rapid7 MDR and incident response teams contributed to this analysis
Recommendations Improve detection and response capabilities, monitor assets for zero-day threats, strengthen identity security
Source Rapid7 

Read full article: https://www.rapid7.com/blog/post/2024/12/11/etr-modular-java-backdoor-dropped-in-cleo-exploitation-campaign/

The above summary has been generated by an AI language model

Source: Rapid7

Published on: December 11, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *