Hacker nehmen WhatsUp Gold mit öffentlichem Exploit seit August ins Visier

Teilen:

Hackers have been leveraging publicly available exploit code for two critical vulnerabilities in the WhatsUp Gold network availability and performance monitoring solution from Progress Software.

The two flaws exploited in attacks since August 30 are SQL injection vulnerabilities tracked as CVE-2024-6670 and CVE-2024-6671 that allow retrieving encrypted passwords without authentication.

Despite the vendor addressing the security issues more than two weeks ago, many organizations still have to update the software and threat actors are capitalizing on the delay.

Progress Software released security updates to address the problems on August 16 and added instructions on how to detect potential compromise in a security bulletin on September 10.

Security researcher Sina Kheirkhah (@SinSinology) who discovered the flaws and reported them to the Zero Day Initiative (ZDI) on May 22. On August 30, the researcher published the proof-of-concept (PoC) exploits.

The researcher explains in a technical write-up how to leverage an improper sanitization problem in user inputs to insert arbitrary passwords into the password field of administrator accounts, thus making them vulnerable to takeover.

Kheirkhah's exploit overview
Kheirkhah’s exploit overview
Source: summoning.team

In the wild exploitation

A report today from cybersecurity company Trend Micro notes that hackers have started to exploit the vulnerabilities and based on the observations, it appears that that the attacks are based on Kheirkhah’s PoCs for bypassing authentication and get to the remote code execution and payload deployment stage.

“Trend Micro researchers identified remote code execution attacks on WhatsUp Gold exploiting the Active Monitor PowerShell Script since August 30” – Trend Micro

The security firm’s telemetry caught the first signs of active exploitation five hours after the researcher published the PoC exploit code.

The attackers leverage WhatsUp Gold’s legitimate Active Monitor PowerShell Script functionality to run multiple PowerShell scripts via NmPoller.exe, retrieved from remote URLs.

Malicious PowerShell script deployed by the attackers
Malicious PowerShell script deployed by the attackers
Source: Trend Micro

Next, the attackers use the legitimate Windows utility ‘msiexec.exe’ to install various remote access tools (RATs) through MSI packages, including Atera Agent, Radmin, SimpleHelp Remote Access, and Splashtop Remote.

Planting these RATs allows the attackers to establish persistence on the compromised systems. In some cases, Trend Micro observed the deployment of multiple payloads.

The analysts were unable to attribute these attacks to a particular threat groups but the use of multiple RATs suggests that it could be ransomware actors.

Attack flow of the observed activity
Attack flow of the observed activity
Source: Trend Micro

In a comment to BleepingComputer, Kheirkhah thanked ZDI and expressed hope that his write-ups and PoCs will eventually help increase the security of the impacted product in the future.

This is not the first time WhatsUp Gold has been under fire by publicly available exploits this year.

In early August, threat monitoring organization Shadowserver Foundation reported that its honeypots caught attempts to exploit CVE-2024-4885, a critical remote code execution flaw disclosed on June 25, 2024.

That flaw was also discovered by Kheirkhah, who published the complete details on his blog two weeks later.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:54 pm, Jan. 24, 2025
Wetter-Symbol 8°C
L: 7° | H: 9°
overcast clouds
Luftfeuchtigkeit: 75 %
Druck: 1000 mb
Wind: 7 mph S
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:49 am
Sonnenuntergang: 4:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
7° | 9°°C 0 mm 0% 8 mph 75 % 1000 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 8°°C 1 mm 100% 7 mph 93 % 1010 mb 0 mm/h
So. Jan. 26 9:00 pm
Wetter-Symbol
2° | 8°°C 1 mm 100% 16 mph 91 % 1009 mb 0 mm/h
Mo. Jan. 27 9:00 pm
Wetter-Symbol
6° | 8°°C 1 mm 100% 23 mph 92 % 983 mb 0 mm/h
Di. Jan. 28 9:00 pm
Wetter-Symbol
8° | 9°°C 1 mm 100% 20 mph 84 % 995 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
6° | 8°°C 0 mm 0% 8 mph 75 % 1000 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
7° | 8°°C 0 mm 0% 5 mph 78 % 1000 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
6° | 7°°C 0 mm 0% 4 mph 85 % 999 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
3° | 3°°C 1 mm 100% 7 mph 93 % 1001 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
5° | 5°°C 0.59 mm 59% 6 mph 73 % 1004 mb 0 mm/h
Tomorrow 12:00 pm
Wetter-Symbol
6° | 6°°C 0.22 mm 22% 7 mph 55 % 1006 mb 0 mm/h
Tomorrow 3:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 4 mph 56 % 1008 mb 0 mm/h
Tomorrow 6:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 70 % 1009 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€100,790.46
2.16%
Ethereum(ETH)
€3,209.05
5.48%
XRP(XRP)
€2.99
2.43%
Fesseln(USDT)
€0.95
0.00%
Solana(SOL)
€248.95
6.46%
Dogecoin(DOGE)
€0.340607
3.91%
USDC(USDC)
€0.95
-0.01%
Shiba Inu(SHIB)
€0.000019
3.04%
Pepe(PEPE)
€0.000015
8.16%
Peanut das Eichhörnchen(PNUT)
€0.341906
3.03%
Nach oben scrollen