Case of ActiveMQ Vulnerability Exploitation to Install Sharpire (Kinsing)

Case of ActiveMQ Vulnerability Exploitation to Install Sharpire (Kinsing)

AhnLab SEcurity intelligence Center (ASEC) has confirmed that the Kinsing threat actor is still distributing malware by exploiting known vulnerabilities. Since the disclosure of the CVE-2023-46604 vulnerability in ActiveMQ, the threat actor has been exploiting it to install malware on both Linux and Windows systems. [1] Aside from the well-known XMRig

Case of Malware Distribution Linking to Illegal Gambling Website Targeting Korean Web Server

Case of Malware Distribution Linking to Illegal Gambling Website Targeting Korean Web Server

AhnLab SEcurity intelligence Center (ASEC) has discovered evidence of a malware strain being distributed to web servers in South Korea, leading users to an illegal gambling site. After initially infiltrating a poorly managed Windows Internet Information Services (IIS) web server in Korea, the threat actor installed the Meterpreter backdoor, a

Analysis Report on Malware  Distributed Through a South  Korean Language Academy  Website

Analysis Report on Malware Distributed Through a South Korean Language Academy Website

Overview   The AhnLab SEcurity intelligence Center (ASEC) recently confirmed that a Meterpreter backdoor, port forwarding, and IIS module malware tools were installed through an improperly managed Windows IIS (Internet Information Services) web server. In the case of this attack, the threat actor ultimately installed IIS module malware on the

Metasploit Meterpreter Installed via Redis Server

Metasploit Meterpreter Installed via Redis Server

AhnLab SEcurity intelligence Center (ASEC) recently discovered that the Metasploit Meterpreter backdoor has been installed via the Redis service. Redis is an abbreviation of Remote Dictionary Server, which is an open-source in-memory data structure storage that is also used as a database. It is presumed that the threat actors abused

Kimsuky Group Using Meterpreter to Attack Web Servers

Kimsuky Group Using Meterpreter to Attack Web Servers

AhnLab Security Emergency response Center (ASEC) has recently discovered the distribution of malware targeting web servers by Kimsuky group. Kimsuky is a threat group deemed supported by North Korea and has been active since 2013. At first, they attacked North Korea-related research institutes in South Korea before attacking a Korean

Meterpreter Distributed to Vulnerable Server of Korean Medical Institution

Meterpreter Distributed to Vulnerable Server of Korean Medical Institution

While monitoring malware strains distributed to vulnerable servers, the ASEC analysis team discovered an attack case for PACS (Picture Archiving and Communication System) server used by Korean medical institutions. PACS is a system for digitally managing and transferring medical images of patients, which is used to check and interpret the

Case of Attack Exploiting AnyDesk Remote Tool (Cobalt Strike and Meterpreter)

Case of Attack Exploiting AnyDesk Remote Tool (Cobalt Strike and Meterpreter)

MS-SQL servers are mainly the attack targets for Windows systems. Attackers scan vulnerable MS-SQL servers that are poorly managed and install malware upon gaining control. Malware strains installed by attackers include CoinMiner, ransomware, backdoor, etc., and may vary depending on the purpose of the attack.   Most backdoor strains are

Attack Cases Using Metasploit Meterpreter

Attack Cases Using Metasploit Meterpreter

  Metasploit is a framework used in penetration testing. It is a tool that can be used to inspect security vulnerabilities for networks and systems of companies and organizations, providing various features for each penetration test stage. Like Cobalt Strike, it provides features necessary for each stage, from creating various