Hackers targeting WhatsUp Gold with public exploit since August

Share:

Hackers have been leveraging publicly available exploit code for two critical vulnerabilities in the WhatsUp Gold network availability and performance monitoring solution from Progress Software.

The two flaws exploited in attacks since August 30 are SQL injection vulnerabilities tracked as CVE-2024-6670 and CVE-2024-6671 that allow retrieving encrypted passwords without authentication.

Despite the vendor addressing the security issues more than two weeks ago, many organizations still have to update the software and threat actors are capitalizing on the delay.

Progress Software released security updates to address the problems on August 16 and added instructions on how to detect potential compromise in a security bulletin on September 10.

Security researcher Sina Kheirkhah (@SinSinology) who discovered the flaws and reported them to the Zero Day Initiative (ZDI) on May 22. On August 30, the researcher published the proof-of-concept (PoC) exploits.

The researcher explains in a technical write-up how to leverage an improper sanitization problem in user inputs to insert arbitrary passwords into the password field of administrator accounts, thus making them vulnerable to takeover.

Kheirkhah's exploit overview
Kheirkhah’s exploit overview
Source: summoning.team

In the wild exploitation

A report today from cybersecurity company Trend Micro notes that hackers have started to exploit the vulnerabilities and based on the observations, it appears that that the attacks are based on Kheirkhah’s PoCs for bypassing authentication and get to the remote code execution and payload deployment stage.

“Trend Micro researchers identified remote code execution attacks on WhatsUp Gold exploiting the Active Monitor PowerShell Script since August 30” – Trend Micro

The security firm’s telemetry caught the first signs of active exploitation five hours after the researcher published the PoC exploit code.

The attackers leverage WhatsUp Gold’s legitimate Active Monitor PowerShell Script functionality to run multiple PowerShell scripts via NmPoller.exe, retrieved from remote URLs.

Malicious PowerShell script deployed by the attackers
Malicious PowerShell script deployed by the attackers
Source: Trend Micro

Next, the attackers use the legitimate Windows utility ‘msiexec.exe’ to install various remote access tools (RATs) through MSI packages, including Atera Agent, Radmin, SimpleHelp Remote Access, and Splashtop Remote.

Planting these RATs allows the attackers to establish persistence on the compromised systems. In some cases, Trend Micro observed the deployment of multiple payloads.

The analysts were unable to attribute these attacks to a particular threat groups but the use of multiple RATs suggests that it could be ransomware actors.

Attack flow of the observed activity
Attack flow of the observed activity
Source: Trend Micro

In a comment to BleepingComputer, Kheirkhah thanked ZDI and expressed hope that his write-ups and PoCs will eventually help increase the security of the impacted product in the future.

This is not the first time WhatsUp Gold has been under fire by publicly available exploits this year.

In early August, threat monitoring organization Shadowserver Foundation reported that its honeypots caught attempts to exploit CVE-2024-4885, a critical remote code execution flaw disclosed on June 25, 2024.

That flaw was also discovered by Kheirkhah, who published the complete details on his blog two weeks later.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
11:38 pm, Jun 23, 2025
weather icon 16°C
L: 14° | H: 17°
scattered clouds
Humidity: 59 %
Pressure: 1015 mb
Wind: 14 mph W
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 49%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
14° | 17°°C 0 mm 0% 14 mph 72 % 1015 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 28°°C 0.21 mm 21% 10 mph 86 % 1013 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
17° | 24°°C 1 mm 100% 17 mph 94 % 1018 mb 0 mm/h
Fri Jun 27 10:00 pm
weather icon
15° | 27°°C 0 mm 0% 15 mph 71 % 1021 mb 0 mm/h
Sat Jun 28 10:00 pm
weather icon
17° | 29°°C 0.2 mm 20% 12 mph 85 % 1025 mb 0 mm/h
Tomorrow 1:00 am
weather icon
14° | 16°°C 0 mm 0% 10 mph 60 % 1015 mb 0 mm/h
Tomorrow 4:00 am
weather icon
13° | 15°°C 0 mm 0% 9 mph 66 % 1015 mb 0 mm/h
Tomorrow 7:00 am
weather icon
16° | 16°°C 0 mm 0% 11 mph 71 % 1014 mb 0 mm/h
Tomorrow 10:00 am
weather icon
18° | 18°°C 0 mm 0% 12 mph 72 % 1013 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
20° | 20°°C 0 mm 0% 14 mph 71 % 1013 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
23° | 23°°C 0 mm 0% 12 mph 57 % 1011 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
24° | 24°°C 0 mm 0% 12 mph 49 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
20° | 20°°C 0 mm 0% 9 mph 68 % 1013 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,320.75
5.51%
Ethereum(ETH)
€2,112.13
9.49%
Tether(USDT)
€0.87
0.05%
XRP(XRP)
€1.88
9.11%
Solana(SOL)
€126.92
11.28%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.143071
10.50%
Shiba Inu(SHIB)
€0.000010
11.16%
Pepe(PEPE)
€0.000009
13.22%
Scroll to Top