Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Progress WhatsUp Gold was used just hours after the PoC was released due to a critical flaw
Global Security

Progress WhatsUp Gold was used just hours after the PoC was released due to a critical flaw

AdminBy AdminSeptember 13, 2024No Comments3 Mins Read
Progress WhatsUp Gold
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 13, 2024Ravi LakshmananSoftware Security / Threat Intelligence

WhatsUp Gold progress

Attackers are likely using publicly available proof-of-concept (PoC) exploits for recently discovered security flaws in Progress Software’s WhatsUp Gold to conduct opportunistic attacks.

Activity is said to have started on August 30, 2024, just five hours after the PoC was released for CVE-2024-6670 (CVSS Score: 9.8) by security researcher Sina Heirkham of the challenge team, who is also credited with the discovery and reporting CVE-2024-6671 (CVSS scores: 9.8).

Both critical vulnerabilities, which allow an unauthenticated attacker to obtain an encrypted user password, were patched up by Progress in mid-August 2024.

Cyber ​​security

“The chronology of events suggests that despite the availability of fixes, some organizations failed to apply them quickly, leading to incidents almost immediately after the PoC was published,” Trend Micro researchers Hitomi Kimura and Maria Emrin Virei said in Thursday’s analysis.

Attacks observed by the cybersecurity firm include bypassing WhatsUp Gold authentication to use a PowerShell Active Monitor script and ultimately loading various remote access tools to gain access to a Windows host.

This includes Atera Agent, Radmin, SimpleHelp Remote Access, and Splashtop Remote, with both Atera Agent and Splashtop Remote installed using a single MSI installer file obtained from the remote server.

WhatsUp Gold progress

“The polling process NmPoller.exe, a WhatsUp Gold executable, appears to be capable of hosting a script named Active Monitor PowerShell Script as a legitimate function,” the researchers explained. “The threat actors in this case chose it to run for remote arbitrary code execution.”

Although no further exploits were detected, the use of multiple remote access programs indicates the involvement of a ransomware actor.

This is the second time that security vulnerabilities in WhatsUp Gold have been actively used as a weapon. At the beginning of last month, the Shadowserver Foundation said it observed attempts to exploit CVE-2024-4885 (CVSS score: 9.8), another critical bug that was resolved by Progress in June 2024.

Cyber ​​security

The disclosure comes weeks after Trend Micro also discovered that threat actors were exploiting a patched security flaw in Atlassian Confluence Data Center and Confluence Server (CVE-2023-22527CVSS score: 10.0) for delivering Godzilla’s web shell.

“The CVE-2023-22527 vulnerability continues to be widely exploited by a wide range of threat actors who are abusing this vulnerability to perform malicious activities, making it a significant security risk for organizations worldwide,” the company said in a statement. said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.