• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell

You are here: Home / Cyber Security News / April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell

Scientists say a GitHub proof-of-notion exploitation of not long ago introduced VMware bugs is remaining abused by hackers in the wild.

Just lately noted VMware bugs are becoming used by hackers who are concentrated on employing them to deliver Mirai denial-of-services malware and exploit the Log4Shell vulnerability.

Security scientists at Barracuda identified that makes an attempt had been manufactured to exploit the current vulnerabilities CVE-2022-22954 and CVE-2022-22960, both documented last month.

“Barracuda researchers analyzed the attacks and payloads detected by Barracuda programs concerning April to May perhaps and found a continuous stream of tries to exploit two just lately uncovered VMware vulnerabilities: CVE-2022-22954 and CVE-2022-22960” noted by Barracuda.

VMware published an advisory on April 6, 2022, which in-depth various security vulnerabilities. The most serious of these is CVE-2022-22954 with a CVSS rating of 9.8, the bug enables an attacker with network entry to execute remote code execution by way of server-side template injection on VMware Workspace One Accessibility and Identity Manager Remedies.

The other bug included CVE-2022-22960 (CVSS rating 7.8), is a neighborhood privilege escalation vulnerability in VMware Workspace Just one Accessibility, Identification Manager, and vRealize Automation. In accordance to the advisory by VMware, the bug arises thanks to improper permission in assistance scripts making it possible for an attacker with community obtain to acquire root privileges.

The VMware Workspace A single is an intelligent-push workspace system that assists to regulate any app on any product in a safe and less complicated way. The Identity manager handles the authentication to the system and vRealize Automation is a DevOps-centered infrastructure administration system for config of IT resources and automating the shipping and delivery of container-based applications.

Exploitation Transpired Soon after PoC Release

The Barracuda scientists mentioned that the past flaws are chained alongside one another for a opportunity full exploitation vector.

Just after the bug was disclosed by VMware in April, a evidence-of-idea (PoC) was launched on Github and shared by means of Twitter.

“Barracuda researchers started looking at probes and exploit attempts for this vulnerability soon following the release of the advisory and the original release of the proof of strategy on GitHub,” documented Barracuda.

Immediately after the launch of PoC, the spike in makes an attempt is found by the researcher, they classified it as a probe alternatively than actual tries to exploit.

“The attacks have been steady around time, barring a number of spikes, and the wide bulk of them are what would be categorized as probes instead than real exploit tries,” they added.

The scientists at Barracuda also discovered that most of the exploit makes an attempt are generally from botnet operators, the IPs uncovered however appear to host variants of the Mirai distributed-denial-of-services (DDoS) botnet malware, together with some Log4Shell exploits and lower ranges of EnemyBot (a form of DDoS botnet) attempts.

The the greater part of the assaults (76 per cent) originated from the U.S. geographically, with most of them coming from knowledge facilities and cloud providers. The researcher included that there is a spike in IP addresses from the Uk and Russia and about (6 percent) of the attacks emanate from these destinations.

The scientists observed, “there are also regular qualifications tries from acknowledged terrible IPs in Russia.”

“Some of these IPs conduct scans for particular vulnerabilities at typical intervals, and it appears to be like the VMware vulnerabilities have been additional to their standard rotating record of Laravel/Drupal/PHP probes,” scientists defined

In accordance to Barracuda “the desire ranges on these vulnerabilities have stabilized” after the preliminary spike in April, the researcher predicted to analyze small-degree scanning and tries for some time.

The finest way to protect the units is to utilize the patches quickly, in particular if the procedure is internet-struggling with, and to spot a Web application firewall (WAF) in entrance of these methods “will insert to protection in depth in opposition to zero-working day assaults and other vulnerabilities, such as Log4Shell,” advised by Barracuda.

Some parts of this article are sourced from:
threatpost.com

Previous Post: « Police Warn of £15m Courier Scams
Next Post: New York City reportedly has more Airbnb listings than rentable apartments »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © 2025 · AllTech.News, All Rights Reserved.