Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Thousands of Grok chats are now searchable on Google

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Apache activemq flaw was exploited to deploy Dripdropper malware on cloud Linux systems
Identity

Apache activemq flaw was exploited to deploy Dripdropper malware on cloud Linux systems

userBy userAugust 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananLinux/Malware

Threat actors are taking advantage of the security flaws of almost two years ago in Apache ActiveMQ to gain permanent access to Cloud Linux systems and deploying malware called DripDropper.

However, with an anomalous twist, it has been observed that unknown attackers patched exploited vulnerabilities after ensuring initial access to prevent further exploitation by other enemies and avoid detection.

“The hostile command and control (C2) tools that contain slivers vary by endpoint, depending on the CloudFlare tunnel to maintain long-term secret command and control,” said researchers Christina Johns, Chris Brook and Tyler Edmonds.

The attack takes advantage of the maximum focus security flaw of Apache ActiveMQ (CVE-2023-46604, CVSS score: 10.0). It was dealt with in late October 2023.

Cybersecurity

The security flaws have since been under intense exploitation, and multiple threat actors have leveraged it to deploy a wide range of payloads, including Hellokitty Ransomware, Linux Rootkits, Gotitan Botnet malware, and Godzilla Web Shell.

Attack activity detected by Red Canary has been observed by threat actors leveraging access to modify existing SSHD configurations to enable root logins, allowing increased access to drop previously unknown downloader dubbed Dripdroppers.

DripDropper, a Pyinstaller executable and Linkable Format (ELF) binary, must run a password to resist analysis. We also communicated with attacker-controlled Dropbox accounts and once again explained how threat actors are increasingly dependent on legitimate services, merging with regular network activity and side step detection.

Ultimately, it acts as a conduit for two files. One of them makes various action sets easy on a variety of endpoints, from monitoring processes to contacting Dropbox. The persistence of dropped files is achieved by changing the 0anacron file, /etc/cron.daily, /etc/cron.weekly, /etc/cron.monthly directories that are present in /etc /cron.hourly.

The second file dropped by DripDropper is designed to contact Dropbox to receive commands, but the existing configuration files associated with SSH will also be modified. The final stage involves attackers downloading from Apache Maven Patches on CVE-2023-46604, effectively plugging the flaws.

“Patching a vulnerability does not disrupt the operation as other persistence mechanisms have already been established for continuous access,” the researchers said.

Identity Security Risk Assessment

It’s certainly rare, but this technique is nothing new. Last month, French national cybersecurity agency Anssi detailed early access brokers in China and nexus, which adopted the same approach to ensure access to the system and prevent other threat actors from masking the initial access vectors that were first used using the drawbacks.

This campaign provides timely reminders of why your organization needs to patch in a timely manner, restricts access to internal services by configuring ingress rules to a trusted IP address or VPN, monitoring logging in your cloud environment and flags outliers activity.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIndian government proposes ban blankets for real games
Next Article Databricks CEO says a fresh billion dollar will help him attack the new AI database market
user
  • Website

Related Posts

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

August 20, 2025

Discover and control Shadow AI agents in your company before hackers do it

August 20, 2025

Turn BIA insights into resilient recovery

August 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Thousands of Grok chats are now searchable on Google

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

Discover and control Shadow AI agents in your company before hackers do it

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.