Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Congress greenlighted the NASA Moon Plan against Musk and Isakuman

Figma approaches a smash hit IPO that can raise $1.5 billion

Automattic puts Tumblr migration on WordPress

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The flaws in PHP-CGI RCE were exploited in attacks on the Japanese technology, communications and e-commerce sector
Identity

The flaws in PHP-CGI RCE were exploited in attacks on the Japanese technology, communications and e-commerce sector

userBy userMarch 7, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 7, 2025Ravi LakshmananThreat Intelligence/Vulnerability

PHP-CGI RCE defects have been exploited

Threat actors of unknown origin have been attributed to malicious campaigns, primarily targeting Japanese organizations since January 2025.

“The attacker exploited CVE-2024-4577, a flaw in Remote Code Execution (RCE) implementation of PHP-CGI on Windows.

“The attacker is using the publicly published cobalt strike kit, “Taowu” for-post Exploation Activity plugin.”

The goals of malicious activities cover companies across Japan’s technology, telecommunications, entertainment, education and e-commerce sectors.

It all starts with a threat actor who exploits the vulnerability in CVE-2024-4577 to gain initial access, executes a PowerShell script and executes a Cobalt Strike Reverse HTTP shellcode payload, allowing permanent remote access to the compromised endpoint.

The next step requires reconnaissance, privilege escalation, and lateral movement using tools such as Juicypotato, Rottenpotato, Sweetpotato, FSCAN, Seatbelt. A plugin from the Cobalt Strike kit called Taowu is used to establish additional persistence through Windows registry changes, scheduled tasks, and bespoke services.

“To maintain stealth, we use the Wevtutil command to clear the event log and remove traces of action from Windows Security, System and Application Logs,” says Raghuprasad. “In the end, they run the Mimikatz command to dump and remove the password and NTLM hash from the memory of the victim’s machine.”

Cybersecurity

The attack culminates with hacking crew stealing passwords, and NTLM hashs from infected hosts. Further analysis of command and control (C2) servers associated with the Cobalt Strike Tool has revealed that threat actors will leave a directory list that can be accessed via the Internet, thereby exposing the complete suite of adversarial tools and frameworks hosted on Alibaba cloud servers.

PHP-CGI RCE defects have been exploited

The most notable tools are listed below –

Browser Exploit Framework (BEEF), published pen test software for running commands within the browser context Viper C2, modular C2 framework that facilitates remote command execution and generation of meter preter reverse shell payloads, Blue Lotus, JavaScript WebShell Cross Site Scricking (XSS) attacks realizes screenshots, get reverse shells, steal browser cookies, create new accounts with content management system (CMS)

“We assess with moderate confidence that attackers’ motivations go beyond mere qualification yields based on observations of other post-exploitation activities, including establishment of sustainability, increased system-level privilege, and potential access to adversarial frameworks, indicating the possibility of future attacks.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCharged in Australia after a flight with a shotgun | Aviation News
Next Article Federal judges hear debate about whether to stop immigrant arrests in US schools
user
  • Website

Related Posts

Anthropic MCP Critical Vulnerability Exposes Developer Machines to Remote Exploits

July 1, 2025

TA829 and UNK_GREENSEC share tactics and infrastructure in an ongoing malware campaign

July 1, 2025

New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Congress greenlighted the NASA Moon Plan against Musk and Isakuman

Figma approaches a smash hit IPO that can raise $1.5 billion

Automattic puts Tumblr migration on WordPress

Anthropic MCP Critical Vulnerability Exposes Developer Machines to Remote Exploits

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.