Programming Books

Main Menu

  • Home
  • Phyton programming
  • Java programming
  • Php programming
  • C++ programming
  • Additional Topics
    • Programming industry
    • Privacy Policy
    • Terms and Conditions

Programming Books

Header Banner

Programming Books

  • Home
  • Phyton programming
  • Java programming
  • Php programming
  • C++ programming
  • Additional Topics
    • Programming industry
    • Privacy Policy
    • Terms and Conditions
Java programming
Home›Java programming›VMware Horizon servers are actively exploited by Iranian state hackers

VMware Horizon servers are actively exploited by Iranian state hackers

By Brandy J. Richardson
February 17, 2022
0
0

Hackers aligned with the Iranian government are exploiting the critical Log4j vulnerability to infect unpatched VMware users with ransomware, researchers said Thursday.

Security company SentinelOne dubbed the group TunnelVision. The name is meant to emphasize TunnelVision’s heavy reliance on tunneling tools and the unique way it deploys them. In the past, TunnelVision has exploited so-called day-old vulnerabilities, meaning vulnerabilities that have been recently patched, to hack into organizations that have not yet installed the patch. Vulnerabilities in Fortinet FortiOS (CVE-2018-13379) and Microsoft Exchange (ProxyShell) are two of the group’s best-known targets.

Enter Log4Shell

Recently, SentinelOne reported that TunnelVision began exploiting a critical vulnerability in Log4j, an open-source logging utility embedded in thousands of applications. CVE-2021-44228 (or Log4Shell, as the vulnerability is tracked or dubbed) allows attackers to easily take remote control of computers running applications in the Java programming language. The bug has bitten the internet’s biggest players and has been widely targeted in the wild after it became known.

SentinelOne research shows that the targeting continues and this time the target is organizations running VMware Horizon, a desktop and application virtualization product that runs on Windows, macOS and Linux.

“TunnelVision attackers actively exploited the vulnerability to execute malicious PowerShell commands, deploy backdoors, create backdoor users, harvest credentials, and perform lateral movements,” the company’s researchers said. Amitai Ben Shushan Ehrlich and Yair Rigevsky. written in a post. “Typically, the threat actor initially exploits the Log4j vulnerability to execute PowerShell commands directly, and then executes other commands through PS reverse shells, executed through the Tomcat process.”

Advertising

Apache Tomcat is an open source web server that VMware and other enterprise software use to deploy and serve Java-based web applications. Once installed, a shell allows attackers to remotely execute commands of their choosing on exploited networks. The PowerShell used here appears to be a variant of this accessible to the public. Once installed, TunnelVision members use it to:

  • Execute recognition commands
  • Create a backdoor user and add it to the network administrators group
  • Collect Credentials Using ProcDump, SAM Hive Dumps, and comsvcs MiniDump
  • Download and run tunneling tools, including Plink and Ngrok, which are used to tunnel Remote Desktop Protocol traffic

Hackers use several legitimate services to perform and hide their activities. These services include:

  • transfer.sh
  • pastebin.com
  • webhook.site
  • ufile.io
  • raw.githubusercontent.com

People trying to determine if their organization is affected should look for unexplained outbound connections to these legitimate utilities.

Tunnels, minerals and kittens

Thursday’s report says TunnelVision overlaps with several groups of threats exposed by other researchers over the years. Microsoft dubbed a band Phosphorous. The group, Microsoft reported, attempted to hack into a US presidential campaign and install ransomware in an effort to generate revenue or disrupt opponents. The federal government also said that Iranian hackers had targeted critical infrastructure in the United States with ransomware.

SentinelOne said TunnelVision also overlaps with two threat groups security firm CrowdStrike tracks as Charming Kitten and Nemesis Kitten.

“We are tracking this cluster separately as ‘TunnelVision,'” the SentinelOne researchers wrote. “This does not mean that we believe they are necessarily unrelated, only that there is currently insufficient data to treat them as identical to any of the aforementioned attributions.”

The message provides a list of indicators that administrators can use to determine if they have been compromised.

Related posts:

  1. The 5 Best Entry-Level Coding Jobs to Start Your Career
  2. The Great Learning Academy has seen its user base increase by 5 times
  3. Once a pioneer, quantum computer developer D-Wave to start making same types of machines as its competitors
  4. Senior Manager, Software Engineering, Backend job at Capital One
Tagsunited states

Archives

  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • January 2021
  • December 2019
  • November 2019
  • October 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2017

Categories

  • C++ programming
  • Java programming
  • Php programming
  • Phyton programming
  • Programming industry

Recent Posts

  • Rust could be included in the Linux kernel in 5.20
  • [Around the Hotels] Promotions and packages
  • AWS Mainframe Modernization Service Now Generally Available
  • Rates rise for private student loans, but borrowers with good credit can still save
  • Lycoming College student secures his future with the Ministry of Defense | Education
  • Privacy Policy
  • Terms and Conditions