CATEGORY: Emerging Threat
The backdoor SpeakUp connects to the command and control (C&C) server upon infection, to register the machine and exploits known vulnerabilities in six diﬀerent Linux distributions. The initial infection vector is targeting the recently reported vulnerability in ThinkPHP and uses command injection techniques for uploading a PHP shell that serves and executes a Perl backdoor. It begins with exploiting CVE-2018-20062 for uploading a PHP shell by using a GET request. Then this shell executes commands sent via the “module” parameter in a query.
SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C which is the compromised website of speakupomaha[.]com. The ﬁrst POST packet sends a victim ID and more introductory information such as the current version of the installed script. SpeakUp also equips its backdoors with i (sic), a python script which allows the backdoor to scan and infect more Linux servers within its internal and external subnets. Apart from Brute Forcing other potential victims in the local network, the threat actors try to exploit the following Remote Code Execution vulnerabilities in the targeted servers:
a) CVE-2012-0874: JBoss Enterprise Application Platform Multiple Security Bypass Vulnerabilities
b) CVE-2010-1871: JBoss Seam Framework remote code execution
c) JBoss AS 3/4/5/6: Remote Command Execution (exploit)
d) CVE-2017-10271: Oracle WebLogic wls-wsat Component Deserialization RCE
e) CVE-2018-2894: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware.
f) Hadoop YARN ResourceManager – Command Execution (exploit)
g) CVE-2016-3088: Apache ActiveMQ Fileserver File Upload Remote Code Execution Vulnerability.
A successful exploitation of one of the vulnerabilities will result in deploying the original ibus script on the exploited server. It has the ability to scan the surrounding network of an infected server and distribute the malware.
Mining of Cryptocurrency
Indicators of Compromise
IP(s) / Hostname(s)
Malware Hash (MD5/SHA1/SH256)