Thursday, March 20, 2025

Hackers Exploit Extreme PHP Flaw to Deploy Quasar RAT and XMRig Miners


Mar 19, 2025Ravie LakshmananRisk Intelligence / Cryptojacking

Risk actors are exploiting a extreme safety flaw in PHP to ship cryptocurrency miners and distant entry trojans (RATs) like Quasar RAT.

The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Home windows-based programs operating in CGI mode that might enable distant attackers to run arbitrary code.

Cybersecurity firm Bitdefender mentioned it has noticed a surge in exploitation makes an attempt in opposition to CVE-2024-4577 since late final yr, with a big focus reported in Taiwan (54.65%), Hong Kong (27.06%), Brazil (16.39%), Japan (1.57%), and India (0.33%).

Cybersecurity

About 15% of the detected exploitation makes an attempt contain fundamental vulnerability checks utilizing instructions like “whoami” and “echo .” One other 15% revolve round instructions used for system reconnaissance, equivalent to course of enumeration, community discovery, consumer and area info, and system metadata gathering.

Martin Zugec, technical options director at Bitdefender, famous that at the very least roughly 5% of the detected assaults culminated within the deployment of the XMRig cryptocurrency miner.

“One other smaller marketing campaign concerned the deployment of Nicehash miners, a platform that enables customers to promote computing energy for cryptocurrency,” Zugec added. “The miner course of was disguised as a respectable utility, equivalent to javawindows.exe, to evade detection.”

PHP Flaw to Deploy Quasar RAT

Different assaults have been discovered to weaponize the shortcoming of delivering distant entry instruments just like the open-source Quasar RAT, in addition to execute malicious Home windows installer (MSI) information hosted on distant servers utilizing cmd.exe.

In maybe one thing of a curious twist, the Romanian firm mentioned it additionally noticed makes an attempt to switch firewall configurations on susceptible servers with an purpose to dam entry to recognized malicious IPs related to the exploit.

This uncommon conduct has raised the likelihood that rival cryptojacking teams are competing for management over vulnerable assets and stopping them from concentrating on these below their management a second time. It is also in keeping with historic observations about how cryptjacking assaults are recognized to terminate rival miner processes previous to deploying their very own payloads.

Cybersecurity

The event comes shortly after Cisco Talos revealed particulars of a marketing campaign weaponizing the PHP flaw in assaults concentrating on Japanese organizations because the begin of the yr.

Customers are suggested to replace their PHP installations to the newest model to safeguard in opposition to potential threats.

“Since most campaigns have been utilizing LOTL instruments, organizations ought to contemplate limiting the usage of instruments equivalent to PowerShell throughout the surroundings to solely privileged customers equivalent to directors,” Zugec mentioned.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com