TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in September 2019

2019-10-30 · Read original ↗

ATT&CK techniques detected

6 predictions
T1190Exploit Public-Facing Application
100%
"of september 25, 2019, more than 20, 000 servers, primarily located in the u. s., are running vbulletin cms. initial request and vulnerability analysis since the vulnerability was a zero - day and the exploit was posted without warning, it took vbulletin maintainers more than 24 …"
T1190Exploit Public-Facing Application
99%
"figure 9 shows the contents of the evalcode function after a successful exploitation. notice how the evalcode function is now different from what ’ s shown in figure 8. figure 9. patched bbcode. php file that can only be exploited using the right value for epass once the payload …"
T1190Exploit Public-Facing Application
99%
"to oracle weblogic wls security component rce vulnerability. in order to conduct reconnaissance, the threat actor instructs the server to create a text file in the web folder. this is the first step in a larger attack effort. vbulletin remote code execution ( cve - 2019 - 16759 )…"
T1190Exploit Public-Facing Application
97%
"##71 ) : this campaign aims to first identify web servers vulnerable to the shellshock vulnerability. the threat actor then instructs the server to download and execute an internet relay chat ( irc ) bot malware. - drupal drupalgeddon2 rce ( cve - 2018 - 7600 ) : this campaign fi…"
T1190Exploit Public-Facing Application
93%
"vulnerabilities, exploits, and malware driving attack campaigns in september 2019 security researchers at f5 networks constantly monitor web traffic at various locations all over the world. this allows us to detect “ in the wild ” malware, and to get an insight into the current t…"
T1190Exploit Public-Facing Application
87%
"eval ( ) function within bbcode. php file payload in this particular campaign, the threat actor sends the following code to be executed on a vulnerable vbulletin server. echo shell _ exec ( ' sed - i \ ' s / eval ( \ $ code ) ; / if ( isset ( \ $ _ request [ \ " epass \ " ] ) \ &…"

Summary

Threat actors shift focus away from cryptominers and back to remote code execution—this month with a new zero-day exploits.