Cybersecurity researchers have uncovered an ongoing marketing campaign the place menace actors exploit the crucial CVE-2024-36401 vulnerability in GeoServer, a geospatial database, to remotely execute code and monetize victims’ bandwidth.
This distant code execution flaw, rated at a CVSS rating of 9.8, allows attackers to deploy reliable software program improvement kits (SDKs) or modified purposes that generate passive earnings by means of community sharing or residential proxies.
The method mimics benign monetization methods utilized by app builders, avoiding conventional advertisements to take care of consumer expertise and app retention.
These malicious purposes function silently, consuming minimal sources whereas benefiting from unused bandwidth, with out distributing overt malware.
Targets GeoServer Vulnerability
Since early March 2025, attackers have scanned internet-exposed GeoServer situations, with Cortex Xpanse figuring out 3,706 publicly accessible servers in early Could 2025, highlighting an unlimited assault floor primarily in China and different areas.
The marketing campaign advanced in phases, beginning with preliminary exploits from IP 108.251.152.209 on March 8, 2025, fetching personalized executables from 37.187.74.75.
In line with Unit42 report, these included variants of a misused app (e.g., a193, d193, e193) and SDK (e.g., a593, c593).
By late March, ways shifted after the distribution IP was flagged malicious, halting new app samples and transferring to a brand new IP, 185.246.84.189, by April 1.
Infrastructure expanded additional by mid-April with one other distribution host at 64.226.112.52, sustaining persistence into June 2025.

The exploit leverages JXPath’s extension features in GeoTools, permitting arbitrary code injection by way of expressions like getRuntime().exec(), facilitating command execution by means of requests resembling GetPropertyValue in WFS, WMS, or WPS providers.
Monetization Techniques
In-depth evaluation reveals the exploit chain begins with CVE-2024-36401 to obtain a second-stage payload, like SDK variant z593, from attacker-controlled hosts utilizing switch.sh servers on ports 8080.
This stager fetches further scripts (e.g., z401, z402) that create hidden directories, arrange environments, and launch executables covertly.
The binaries, constructed with Dart for cross-platform Linux compatibility, combine reliable SDKs to share bandwidth for passive earnings, evading detection by mimicking low-profile providers fairly than resource-intensive cryptominers.
Comparability confirms the SDKs are unmodified official variations, probably bypassing endpoint protections.
Telemetry from March-April 2025 exhibits 7,126 uncovered GeoServer situations throughout 99 nations, with China internet hosting the bulk.
To mitigate, organizations ought to patch promptly. Palo Alto Networks’ instruments like Superior Risk Prevention (signature 95463), Superior WildFire, and Cortex XDR present defenses towards these exploits and payloads.
Indicators of Compromise
Kind | Values |
---|---|
IP Addresses | 37.187.74.75:8080, 64.226.112.52:8080, 108.251.152.209, 185.246.84.189 |
Pattern SHA256 Hashes | 89f5e7d66098ae736c39eb36123adcf55851268973e6614c67e3589e73451b24 (a101), 4e4a467abe1478240cd34a1deaef019172b7834ad57d46f89a7c6c357f066fdb (a193), 7c18fe9da63c86f696f9ad7b5fcc8292cac9d49973ba12050c0a3a18b7bd1cc9 (a593), 915d1bb1000a8726df87e0b15bea77c5476e3ec13c8765b43781d5935f1d2609 (z593) |
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, and X to Get Instantaneous Updates!