Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » BianLian threat actors exploit JetBrains TeamCity flaw to launch ransomware attack
    Cyber Security

    BianLian threat actors exploit JetBrains TeamCity flaw to launch ransomware attack

    techempireBy techempire2 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 11, 2024Editorial DepartmentRansomware/vulnerabilities

    ransomware

    It was observed that the threat actors behind the BianLian ransomware exploited security vulnerabilities in JetBrains TeamCity software to conduct ransomware attacks.

    GuidePoint Security has responded to the latest breach, which “began with the exploitation of TeamCity servers, resulting in the deployment of a PowerShell implementation of the BianLian Go backdoor,” according to a new report.

    BianLian emerged in June 2022 and has been focusing on exfiltration-based ransomware since releasing its decryptor in January 2023.

    Internet security

    The attack chain observed by the cybersecurity firm requires exploiting CVE-2024-27198 or CVE-2023-42793 to exploit a vulnerable TeamCity instance to gain initial access to the environment and then create new applications in the build server The attacker executes malicious commands to exploit and move laterally.

    It is unclear which of these two flaws the threat actors used for exfiltration.

    BianLian attackers are known to plant a customized backdoor for each victim written in Go and drop remote desktop tools such as AnyDesk, Atera, SplashTop and TeamViewer. The backdoor was tracked by Microsoft as BianDoor.

    “After multiple failed attempts to execute the standard Go backdoor, the threat actor turned to making a living and leveraged PowerShell to implement the backdoor, which provides nearly the same functionality as the Go backdoor,” said security researchers Justin Timothy, Gabe Renfro, and Keven Murphy.

    The obfuscated PowerShell backdoor (“web.ps1”) is designed to establish a TCP socket for additional network communication with an attacker-controlled server, allowing the remote attacker to execute arbitrary commands on the compromised host. operate.

    “The identified backdoor is capable of interacting with [command-and-control] The server executes asynchronously based on the remote attacker’s post-exploitation goals,” the researchers said.

    The disclosure comes as VulnCheck details a new proof-of-concept (PoC) vulnerability affecting Atlassian Confluence data centers and Confluence servers for a critical security vulnerability (CVE-2023-22527) that could lead to fileless remote execution. code and loads the Godzilla web shell directly into memory.

    Internet security

    Over the past two months, this vulnerability has been weaponized to deploy C3RB3R ransomware, cryptocurrency miners, and remote access trojans, indicating that it is being widely exploited.

    “There’s more than one way to get to Rome,” notes VulnCheck’s Jacob Baines. “While using freemarker.template.utility.Execute appears to be a popular way to exploit CVE-2023-22527, other more subtle paths produce different indicators.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.