Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack

Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack

Posted on February 25, 2026 By CWS

A significant security breach has occurred involving a vulnerability in Apache ActiveMQ, leading to a widespread deployment of LockBit ransomware on an enterprise network. This critical flaw, identified as CVE-2023-46604, permits remote code execution, which attackers exploited to gain access to an unprotected Windows server.

Exploitation of Apache ActiveMQ Vulnerability

The breach commenced in mid-February 2024, when malicious actors utilized the Apache ActiveMQ vulnerability to send a crafted OpenWire command to the publicly accessible server. This exploit prompted the server to load a remote Java Spring XML configuration file, instructing the compromised system to download a Metasploit stager via the Windows CertUtil tool. The stager then established a command-and-control connection to a server controlled by the attackers, rapidly escalating to SYSTEM-level privileges and extracting credentials from LSASS process memory.

Despite initial efforts to remove the attackers, the vulnerability remained unpatched, allowing them to return 18 days later. The attackers re-entered the network by exploiting the same vulnerability, only altering file names. A privileged service account, whose credentials were stolen during the first intrusion, facilitated their re-entry into the system.

Advanced Attack Techniques and Impact

Upon re-entry, attackers confirmed domain administrator access and used a disguised network scanning tool to identify active hosts. They deployed LockBit ransomware executables across servers and workstations via Remote Desktop Protocol (RDP) sessions. The ransomware was executed using specific commands on file servers, while simple execution was used on other machines. The attackers left ransom notes directing victims to the Session private messaging app, indicating a deviation from official LockBit channels.

The overall duration from initial breach to full encryption was 419 hours, or just over 19 days. Early detection of the intrusion was crucial, as the attackers would have required less than 90 minutes to initiate the ransomware execution upon re-entry.

Credential Theft and Defensive Measures

The initial breach involved accessing LSASS memory on several hosts, which was captured in Sysmon logs. This credential theft enabled lateral movement within the network and provided a pathway for the second intrusion. The attackers employed obfuscation techniques for PowerShell commands, using string concatenation and encoding to evade detection. On hosts with active Microsoft Defender, these activities were intercepted and blocked, though unprotected systems were compromised.

To maintain access, the attackers installed AnyDesk silently on the compromised host, configured for auto-start. A batch file manipulated firewall settings to open RDP connections, which were removed shortly after execution. System logs were cleared to conceal their presence, and Windows Defender was disabled on the Exchange server using a legitimate executable.

Security experts advise organizations to promptly patch Apache ActiveMQ to mitigate CVE-2023-46604. Additional recommendations include enforcing LSASS protection, monitoring for log clearing activities, restricting unauthorized remote tool installations, and resetting credentials post-intrusion to prevent further breaches.

Cyber Security News Tags:AnyDesk, Apache ActiveMQ, credential theft, CVE-2023-46604, Cybersecurity, LockBit, LSASS, Metasploit, network security, Ransomware, remote code execution, system vulnerabilities, Threat Actors

Post navigation

Previous Post: US Targets Exploit Brokers for Cyber Tool Theft
Next Post: CISA Alerts on FileZen Vulnerability Exploitation

Related Posts

VMware Tools and Aria Operations Vulnerabilities Let Attackers Escalate Privileges to Root VMware Tools and Aria Operations Vulnerabilities Let Attackers Escalate Privileges to Root Cyber Security News
LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns LinkedIn’s Secret Browser Extension Scan Sparks Privacy Concerns Cyber Security News
German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure Cyber Security News
Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Cyber Security News
EvilTokens and AMOS: Major Phishing Threats of March 2026 EvilTokens and AMOS: Major Phishing Threats of March 2026 Cyber Security News
Critical Juniper Networks Flaw Exposes Devices to Attacks Critical Juniper Networks Flaw Exposes Devices to Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark