PatchWork APT Threat Actor Group – Active IOCs
April 19, 2024Russia-Linked Sandworm Disguises as Hacktivists to Breach Water Utility Systems – Active IOCs
April 19, 2024PatchWork APT Threat Actor Group – Active IOCs
April 19, 2024Russia-Linked Sandworm Disguises as Hacktivists to Breach Water Utility Systems – Active IOCs
April 19, 2024Severity
High
Analysis Summary
Researchers have recently flagged a series of critical vulnerabilities in OpenMetadata, an open-source platform used for metadata management. These vulnerabilities include multiple instances of Spring Expression Language (SpEL) injection and an authentication bypass vulnerability.
The vulnerabilities in question are CVE-2024-28847, CVE-2024-28848, CVE-2024-28253, CVE-2024-28254, and CVE-2024-28255 with the CVSS scores ranging from 8.8 to 9.8. These flaws pose significant risks allowing threat actors to bypass authentication and achieve remote code execution.
The exploitation of these vulnerabilities has been actively observed since April 2024, with threat actors targeting internet-exposed OpenMetadata workloads that remain unpatched. Upon gaining access attackers conduct reconnaissance activities to assess the compromised environment, gathering information on network configuration, operating system details, and active users. Notably, attackers utilize ping requests to domains associated with Interactsh, a tool for detecting out-of-band interactions to validate network connectivity without raising suspicion.
The ultimate objective of these attacks is to establish command-and-control communications deploy crypto-mining malware, and maintain persistence on compromised systems. Attackers leverage both Windows and Linux variants of crypto-mining malware depending on the operating system of the target. Once deployed, the malware mines cryptocurrency, while attackers maintain control through a reverse shell, achieved using the Netcat tool. Persistence is ensured by setting cron jobs to execute malicious code at regular intervals.
An intriguing aspect of these attacks is the personal note left by the threat actor, claiming financial hardship and a desire to avoid illegal activities. Despite this assertion, the actions taken by the attackers demonstrate a clear intent to exploit vulnerable systems for financial gain.
In response to these threats, OpenMetadata users are urged to adopt strong authentication methods avoid default credentials, and promptly update to the latest software version. These precautions are essential for maintaining the security of containerized environments, emphasizing the importance of compliance and patch management practices.
These developments occur in the broader context of increased cyber threats targeting containerized environments. Recent reports highlight similar attacks targeting publicly accessible Redis servers and vulnerabilities in Docker directories, underscoring the need for robust cybersecurity measures to mitigate these risks effectively.
Impact
- Code Execution
- Security Bypass
- Cryptocurrency Theft
Indicators of Compromise
IP
- 61.160.194.160
MD5
- 7c631fca21e348ae4c3408ddd400b416
- 53680ca0ad7e43a212ef0eb07be0e192
- 6f13bac78f174eb29a3ca022c36f1ab0
SHA-256
- 7c6f0bae1e588821bd5d66cd98f52b7005e054279748c2c851647097fa2ae2df
- 19a63bd5d18f955c0de550f072534aa7a6a6cc6b78a24fea4cc6ce23011ea01d
- 31cd1651752eae014c7ceaaf107f0bf8323b682ff5b24c683a683fdac7525bad
SHA1
- faae2eecad2082940462611b7a91c2e4c6241a22
- 7eafccaa4033a4dc1b04d43172738a03bdb1e57b
- 845fdc34c239f2141833d3fbcd2809799b6701b4
Remediation
- Refer to OpenMetadata GIT Repository for patch, upgrade, or suggested workaround information.
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise IOCs in your environment utilizing your respective security controls.
- Implement multi-factor authentication to add an extra layer of security to login processes.
- Regularly monitor network activity for any unusual behavior, as this may indicate that a cyberattack is underway.
- Organizations need to stay vigilant and follow best practices for cybersecurity to protect their systems and data from potential threats. This includes regularly updating software and implementing strong access controls and monitoring tools.
- Develop a comprehensive incident response plan to respond effectively in case of a security breach or data leakage.
- Maintain regular backups of critical data and systems to ensure data recovery in case of a security incident.
- Adhere to security best practices, including the principle of least privilege, and ensure that users and applications have only the necessary permissions.
- Establish a robust patch management process to ensure that security patches are evaluated, tested, and applied promptly.
- Conduct security audits and assessments to evaluate the overall security posture of your systems and networks.
- Implement network segmentation to contain and isolate potential threats to limit their impact on critical systems.