Lucene search

K
hiveproHive ProHIVEPRO:C72A6CAC86F253C92A64FF6B8FCDA675
HistoryMar 29, 2022 - 12:17 p.m.

Muhstik botnet adds another vulnerability exploit to its arsenal

2022-03-2912:17:03
Hive Pro
www.hivepro.com
111

0.976 High

EPSS

Percentile

100.0%

THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Muhstik malware has begun attacking Redis Servers by exploiting a recently reported vulnerability, CVE-2022-0543. This flaw can be found in several Redis Debian packages. The attack began on March 11, 2022, and was carried out by a threat actor who targeted Confluence servers in September 2021 and Log4j in December. The payload is a Muhstik bot variation that may be used to perform DDOS assaults. The threat actor first executes the Lua scripts to exploit the vulnerability found in Redis Debian servers. The threat actor attempts to download "Russia.sh" from "106[.]246.224.219" using wget or curl. It stores it as "/tmp/russ" and runs it which will download and run Linux payload from 160[.]16.58.163. These binaries have been recognized as Muhstik bot variants. This botnet then connects to an IRC server to receive commands that download files, run shell commands, and carry out attacks like flood attacks and SSH brute force attacks. The Mitre TTPs commonly used by Muhstik malware are: TA0001: Initial Access TA0011: Command and Control TA0042: Resource Development TA0008: Lateral Movement T1071: Application Layer Protocol T1588.006: Obtain Capabilities: Vulnerabilities T1190: Exploit Public-Facing Application T1021.004: Remote Services: SSH T1059.004: Command and Scripting Interpreter: Unix Shell Vulnerability Details Indicators of Compromise (IoCs) Patch Links http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html https://security-tracker.debian.org/tracker/CVE-2022-0543 http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html https://github.com/g0rx/CVE-2018-7600-Drupal-RCE https://jira.atlassian.com/browse/CONFSERVER-67940 https://logging.apache.org/log4j/2.x/manual/migration.html References https://blogs.juniper.net/en-us/security/muhstik-gang-targets-redis-servers