Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » PHP-CGI RCE ISTACTS
Global Security

PHP-CGI RCE ISTACTS

AdminBy AdminMarch 7, 2025No Comments3 Mins Read
PHP-CGI RCE Flaw Exploited
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


07 March 2025Red LakshmananIntelligence threats /vulnerability

PHP-CGI RCE Disadvantages operated

The threatening entities of unknown origin were related to the malicious campaign mainly aimed at organizing in Japan since January 2025.

“The attacker exploits vulnerability Cve-2024-4577Lack of Distance Code (RCE) in PHP-CGI PHP on Windows to gain initial victim vehicles, “Cisco Talos Chatan Raghuprasad Researcher – Note In a technical report published on Thursday.

‘The attacker uses plugins of public Cobalt Strike Kit “Taowu” to participate in operation. “

The goals of the malicious activity are covered by technology, telecommunications, entertainment, education and e -commerce companies in Japan.

It all starts with the threat of actors using the CVE-2024-4577 vulnerability to gain initial access and launch PowerShell scripts to perform the COBALT Strike HTTP SHELLCODE load to give yourself a constant distant endpoint.

Cybersecurity

The next step entails exploration, escalation of privileges and lateral movement using tools such as JuicyPotato, RottenPotato, Sweetpotato, FSCAN and Seatable. Additional perseverance is set using the Windows registry modifications, planned tasks and custom services using Cobalt Strike Kit plugins called Taowu.

“To support the stealth, they erase the events using the Wevtutil teams, deleting the traces of their security, system and magazines,” Raghuras said. “After all, they perform Mimikatz teams to reset the passwords and exfiltrate, and NTLM hasha from the victim’s car.”

The attacks end with hacking crews that steal passwords and hashi ntlm from infected hosts. Further analysis of team servers and control (C2) related to the Strike Cobalt Strike tool, showed that the actor threatened the catalogs available on the Internet, thus exposing the full set of adversary tools and frames located on the cloud servers alibaba.

Among the instruments are given below –

  • Browsk (Beef) operating framework, public pentisting software to perform teams in the context of the browser
  • Viper C2, modular base C2, which facilitates the performance of the remote team and the generation of the merchant reversible loads
  • Blue-Lotus, JavaScript Webshell Cross Scite Scripting (XSS), which allows you to create JavaScript Web Shell Useful Loads for Caring XSS, seizure of screenshots, receiving backback, steel browser and creation of new accounts in the content system (CMS)

“We are with moderate confidence that the motive of the attacker goes beyond the simple stable cleaning, based on our observation of other actions after operation, such as the establishment of perseverance, the elevation of the privileges of the systemic level and potential access to the competition, which testifies.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.