Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Public training opens the door to crypto mining in Fortune 500 cloud environments

A green digital economy can improve health and sustainability

UKSA internship leads young people to space careers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Apache activemq flaw was exploited to deploy Dripdropper malware on cloud Linux systems
Identity

Apache activemq flaw was exploited to deploy Dripdropper malware on cloud Linux systems

userBy userAugust 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananLinux/Malware

Threat actors are taking advantage of the security flaws of almost two years ago in Apache ActiveMQ to gain permanent access to Cloud Linux systems and deploying malware called DripDropper.

However, with an anomalous twist, it has been observed that unknown attackers patched exploited vulnerabilities after ensuring initial access to prevent further exploitation by other enemies and avoid detection.

“The hostile command and control (C2) tools that contain slivers vary by endpoint, depending on the CloudFlare tunnel to maintain long-term secret command and control,” said researchers Christina Johns, Chris Brook and Tyler Edmonds.

The attack takes advantage of the maximum focus security flaw of Apache ActiveMQ (CVE-2023-46604, CVSS score: 10.0). It was dealt with in late October 2023.

Cybersecurity

The security flaws have since been under intense exploitation, and multiple threat actors have leveraged it to deploy a wide range of payloads, including Hellokitty Ransomware, Linux Rootkits, Gotitan Botnet malware, and Godzilla Web Shell.

Attack activity detected by Red Canary has been observed by threat actors leveraging access to modify existing SSHD configurations to enable root logins, allowing increased access to drop previously unknown downloader dubbed Dripdroppers.

DripDropper, a Pyinstaller executable and Linkable Format (ELF) binary, must run a password to resist analysis. We also communicated with attacker-controlled Dropbox accounts and once again explained how threat actors are increasingly dependent on legitimate services, merging with regular network activity and side step detection.

Ultimately, it acts as a conduit for two files. One of them makes various action sets easy on a variety of endpoints, from monitoring processes to contacting Dropbox. The persistence of dropped files is achieved by changing the 0anacron file, /etc/cron.daily, /etc/cron.weekly, /etc/cron.monthly directories that are present in /etc /cron.hourly.

The second file dropped by DripDropper is designed to contact Dropbox to receive commands, but the existing configuration files associated with SSH will also be modified. The final stage involves attackers downloading from Apache Maven Patches on CVE-2023-46604, effectively plugging the flaws.

“Patching a vulnerability does not disrupt the operation as other persistence mechanisms have already been established for continuous access,” the researchers said.

Identity Security Risk Assessment

It’s certainly rare, but this technique is nothing new. Last month, French national cybersecurity agency Anssi detailed early access brokers in China and nexus, which adopted the same approach to ensure access to the system and prevent other threat actors from masking the initial access vectors that were first used using the drawbacks.

This campaign provides timely reminders of why your organization needs to patch in a timely manner, restricts access to internal services by configuring ingress rules to a trusted IP address or VPN, monitoring logging in your cloud environment and flags outliers activity.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIndian government proposes ban blankets for real games
Next Article Databricks CEO says a fresh billion dollar will help him attack the new AI database market
user
  • Website

Related Posts

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026

SSHStalker botnet uses IRC C2 to control Linux systems via legacy kernel exploits

February 11, 2026

North Korea-linked UNC1069 uses AI decoys to attack crypto organizations

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Public training opens the door to crypto mining in Fortune 500 cloud environments

A green digital economy can improve health and sustainability

UKSA internship leads young people to space careers

SSHStalker botnet uses IRC C2 to control Linux systems via legacy kernel exploits

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.