20 August 2024

Hackers exploit PHP vulnerability to deploy Msupedge backdoor


Hackers exploit PHP vulnerability to deploy Msupedge backdoor

Threat actors have deployed a previously undocumented backdoor dubbed  ‘Msupedge’ in an attack targeting an unnamed university in Taiwan, according to new findings from the Symantec Threat Hunter Team, part of Broadcom.

The attack stands out because of its use of DNS traffic for command-and-control (C&C) communication, which is not unheard of but rarely seen in the wild, Symantec said.

In the observed attack, the adversary has been exploiting a recently patched PHP vulnerability tracked as CVE-2024-4577. This is an OS command injection flaw that can be exploited for OS commands execution via specially crafted HTTP request.

Msupedge is a backdoor embedded within a dynamic link library (DLL) that allows attackers to maintain persistent access to the compromised systems. The backdoor uses DNS tunneling for communication with the C&C server.

The backdoor's DNS tunneling functionality is reportedly based on the publicly available dnscat2 tool, a popular utility among penetration testers and threat actors alike. Msupedge not only receives commands via DNS queries but also interprets the resolved IP address of the C&C server, ctl.msedeapi[.]net, as a command. This dual-purpose communication method allows attackers to conceal their activities within legitimate DNS traffic, significantly reducing the risk of detection by security solutions.

According to Symantec, multiple threat actors have been observed scanning for vulnerable systems in recent weeks, indicating that the exploitation of CVE-2024-4577 is becoming increasingly widespread. The attackers behind the Msupedge backdoor are believed to have used this vulnerability to gain initial access to the university's network.

Symantec said it has yet to attribute the threat actor behind the campaign due to lack of evidence that would allow to link the attack to a specific group or nation-state.


Back to the list

Latest Posts

What is Vulnerability Management? A Beginner's Guide

What is Vulnerability Management? A Beginner's Guide

In this article will try to cover basics of vulnerability management process and why it is important to every company.
11 September 2024
Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024