Lucene search

K
thnThe Hacker NewsTHN:0E62880C3FB709A30E9D4478EE201ECE
HistoryNov 29, 2023 - 5:07 a.m.

GoTitan Botnet Spotted Exploiting Recent Apache ActiveMQ Vulnerability

2023-11-2905:07:00
The Hacker News
thehackernews.com
36
gotitan botnet
apache activemq vulnerability
prctrl rat
ddos attacks
remote code execution
weaponized
lazarus group
remote server
x64 architecture
c.log
debug log
ddostf
kinsing malware
cryptojacking
sliver
remote access trojan
c2 server

8.1 High

AI Score

Confidence

Low

0.964 High

EPSS

Percentile

99.6%

Apache ActiveMQ Vulnerability

The recently disclosed critical security flaw impacting Apache ActiveMQ is being actively exploited by threat actors to distribute a new Go-based botnet called GoTitan as well as a .NET program known asPrCtrl Rat thatโ€™s capable of remotely commandeering the infected hosts.

The attacks involve the exploitation of a remote code execution bug (CVE-2023-46604, CVSS score: 10.0) that has been weaponized by various hacking crews, including the Lazarus Group, in recent weeks.

Following a successful breach, the threat actors have been observed to drop next-stage payloads from a remote server, one of which is GoTitan, a botnet designed for orchestrating distributed denial-of-service (DDoS) attacks via protocols such as HTTP, UDP, TCP, and TLS.

โ€œThe attacker only provides binaries for x64 architectures, and the malware performs some checks before running,โ€ Fortinet Fortiguard Labs researcher Cara Lin said in a Tuesday analysis.

Cybersecurity

โ€œIt also creates a file named โ€˜c.logโ€™ that records the execution time and program status. This file seems to be a debug log for the developer, which suggests that GoTitan is still in an early stage of development.โ€

GoTitan Botnet

Fortinet said it also observed instances where the susceptible Apache ActiveMQ servers are being targeted to deploy another DDoS botnet called Ddostf, Kinsing malware for cryptojacking, and a command-and-control (C2) framework named Sliver.

Another notable malware delivered is a remote access trojan dubbed PrCtrl Rat that establishes contact with a C2 server to receive additional commands for execution on the system, harvest files, and download and upload files from and to the server.

โ€œAs of this writing, we have yet to receive any messages from the server, and the motive behind disseminating this tool remains unclear,โ€ Lin said. โ€œHowever, once it infiltrates a userโ€™s environment, the remote server gains control over the system.โ€

Found this article interesting? Follow us on Twitter ๏‚™ and LinkedIn to read more exclusive content we post.