Skip to content
  • Computer & Technology
  • SEO
  • Technology
  • About Us
    • Contact Us
    • Advertise Here
    • Disclosure Policy
    • Sitemap
  • Tech News

Trend says hackers have weaponized SpringShell to install Mirai malware

April 10, 2022
evan
0 Comments


Trend says hackers have weaponized SpringShell to install Mirai malware

Getty Images

Researchers on Friday said that hackers are exploiting the recently discovered SpringShell vulnerability to successfully infect vulnerable Internet of Things devices with Mirai, an open source piece of malware that wrangles routers and other network-connected devices into sprawling botnets.

Related Posts:

  • VMware says 3 Tanzu products impacted by Spring4Shell vulnerability

When SpringShell (also known as Spring4Shell) came to light last Sunday, some reports compared it to Log4Shell, the critical zero-day vulnerability in the popular logging utility Log4J that affected a sizable portion of apps on the Internet. That comparison proved to be exaggerated because the configurations required for SpringShell to work were by no means common. To date, there are no real-world apps known to be vulnerable.

Researchers at Trend Micro now say that hackers have developed a weaponized exploit that successfully installs Mirai. A blog post they published didn’t identify the type of device or the CPU used in the infected devices. The post did, however, say a malware file server they found stored multiple variants of the malware for different CPU architectures.

Trend Micro

“We observed active exploitation of Spring4Shell wherein malicious actors were able to weaponize and execute the Mirai botnet malware on vulnerable servers, specifically in the Singapore region,” Trend Micro researchers Deep Patel, Nitesh Surana, and Ashish Verma wrote. The exploits allow threat actors to download Mirai to the “/tmp” folder of the device and execute it following a permission change using “chmod.”

Advertisement

The attacks began appearing in researchers’ honeypots early this month. Most of the vulnerable setups were configured to these dependencies:

  • Spring Framework versions before 5.2.20, 5.3.18, and Java Development Kit (JDK) version 9 or higher 
  • Apache Tomcat
  • Spring-webmvc or spring-webflux dependency
  • Using Spring parameter binding that is configured to use a non-basic parameter type, such as Plain Old Java Objects (POJOs)
  • Deployable, packaged as a web application archive (WAR)

Trend said the success the hackers had in weaponizing the exploit was largely due to their skill in using exposed class objects, which offered them multiple avenues.

“For example,” the researchers wrote, “threat actors can access an AccessLogValve object and weaponize the class variable ‘class.module.classLoader.resources.context.parent.pipeline.firstpath’ in Apache Tomcat. They can do this by redirecting the access log to write a web shell into the web root through manipulation of the properties of the AccessLogValve object, such as its pattern, suffix, directory, and prefix.”

It’s hard to know precisely what to make of the report. The lack of specifics and the geographical tie to Singapore may suggest a limited number of devices are vulnerable, or possibly none, if what Trend Micro saw was some tool used by researchers. With no idea what or if real-world devices are vulnerable, it’s hard to provide an accurate assessment of the threat or provide actionable recommendations for avoiding it.



Source link

0 Technology Way Americas Group Technology Basic Hr Compliance & Technology Blast Technology Vs Tms Bmw Twinpower Technology Explained California Institute Of Technology Film Computer Technology Background Wallpaper Crosspointe Technology Group Csia 310 Siem Technology David Zhou Technology Dynapack International Technology Corp. Emulsion Technology Companies Erie Institiute Of Technology College Honeywell Technology Abn How Has Technology Harmed Society Ihb603b Built In Bluetooth Technology Information Technology Integration Information Technology System Administrator Certificate Julie Grush Technology Lauran Technology Corp Nj Massachusetts Institute Of Technology Area Minghe Technology Tang Shan Napa Nepa Innovative Technology Pregnancy Latest Technology Printer Technology Cartoons Professional Technology Use R Certificate In Automotive Technology Regulations Environmental Bank Information Technology Sciecne And Technology Entry Program Science And Technology Speech Seagate Technology Cusip Shenyang Ocean Technology Co.Ltd Sintec Optronics Technology Pte Ltd Sixth Wave Technology Sni Technology Westover Tx Southington Schools Technology Department Stone Technology Company Student Centered Technology Strategies Examples Sunrise Instruments Technology Inc. Universities That Specialize In Technology University Technology Office Asu Email Us Bea State Technology Exports Uwb Ultra Wide Band Technology Vanderbilt Computer Technology Program W3hat Is Induction Technology Wearable Technology Healthcare Emr Wearable Technology Speed Hpw To Web Technology Jobs Jacksonville Nc Will Socialized Medicine Disincentivize Technology Wuhan Easy Space Information Technology

« OpenAI recruited human contractors to improve GPT-3 • The Register
Mass grave and bodies in Ukraine imaged from space »
Sidebar

Recent Posts

  • 10 Best Android 13 Features
  • Volta Technology Limited to Roll Out Innovative Solid-State Batteries in Early 2023
  • First Look at TinyTendo, a Game Boy-Inspired Handheld with Real NES Hardware
  • Eufy Smart Scale P2 Pro review: Watching your weight and your lifestyle
  • Similarweb Acquires SEO & Rank Tracking Company Rank Ranger
Intellifluence Trusted Blogger

Archives

Categories

May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Apr    

BL

LP

TL

Visit Now

car insurance

play 

pixliv Digitally first class

Theme by The WP Club . Proudly powered by WordPress

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT