Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GeoServer Flaw Exploited in US Federal Agency Hack

Posted on September 24, 2025September 24, 2025 By CWS

The US cybersecurity company CISA has shared particulars on the exploitation of a year-old GeoServer vulnerability to compromise a federal civilian govt department (FCEB) company.

The exploited bug, tracked as CVE-2024-36401 (CVSS rating of 9.8) and resulting in distant code execution (RCE), was disclosed on June 30, 2024, two weeks earlier than CISA added it to the KEV catalog.

On July 11, 2024, 4 days earlier than CISA’s alert, a menace actor exploited the bug to realize entry to a GeoServer occasion pertaining to the sufferer company, then moved laterally to an online server and to an SQL server.

“On every server, they uploaded (or tried to add) net shells resembling China Chopper, together with scripts designed for distant entry, persistence, command execution, and privilege escalation. The cyber menace actors additionally used living-off-the-land (LOTL) strategies,” CISA explains in a recent report.

On July 24, ten days after the bug was added to the KEV checklist, the menace actor exploited the identical vulnerability in one other GeoServer occasion belonging to the identical company.

The attackers dropped net shells and created cron jobs and consumer accounts to take care of persistence, after which tried to escalate privileges, together with by exploiting the Soiled COW vulnerability within the Linux kernel.Commercial. Scroll to proceed studying.

“After compromising net service accounts, they escalated their native privileges to transition away from these service accounts (it’s unknown how they escalated privileges),” CISA explains.

The menace actor additionally used brute pressure assaults to acquire passwords permitting it to maneuver laterally and elevate privileges, carried out reconnaissance utilizing available instruments, downloaded payloads utilizing PowerShell, and deployed the Stowaway multi-level proxy software for command-and-control (C&C).

“The cyber menace actors remained undetected within the group’s setting for 3 weeks earlier than the group’s SOC recognized the compromise utilizing their EDR software,” CISA notes.

Based on the cybersecurity company, the sufferer was inside the KEV-required patching window for the GeoServer bug, however lacked procedures for bringing in third events for help, didn’t detect the exercise on July 15, 2024, when it missed an EDR alert on Stowaway, and didn’t have endpoint safety applied on the internet server.

Whereas CISA has not attributed the assault to a particular menace actor, the China Chopper net shell is usually utilized in assaults by China-linked menace actors resembling APT41 (Brass Storm), Gallium (Granite Storm), and Hafnium (Silk Storm).

Believed to have orchestrated final yr’s US Treasury hack, Silk Storm is thought for focusing on important infrastructure organizations worldwide, and for hacking a number of industries in North America.

“China Chopper has been round for over a decade, and it’s the identical net shell used within the 2021 Alternate assaults. The actual subject is that attackers chained a widely known exploit, moved laterally, and remained contained in the community for almost three weeks earlier than anybody observed, even with EDR deployed. That’s the trendy hazard we’re coping with. It’s not unique zero-days, however gaps that go unpatched and undetected till it’s too late,” Tuskira CEO and co-founder Piyush Sharma stated.

Associated: All Microsoft Entra Tenants Have been Uncovered to Silent Compromise by way of Invisible Actor Tokens: Researcher

Associated: SonicWall Updates SMA 100 Home equipment to Take away Overstep Malware

Associated: Sesame Workshop Regains Management of Elmo’s Hacked X Account After Racist Posts

Associated: How Do You Know If You’re Prepared for a Pink Crew Partnership?

Security Week News Tags:Agency, Exploited, Federal, Flaw, GeoServer, Hack

Post navigation

Previous Post: UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
Next Post: Hackers Can Compromise Chromium Browsers in Windows by Loading Arbitrary Extensions

Related Posts

CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry Security Week News
Inside the Dark Web’s Access Economy: How Hackers Sell the Keys to Enterprise Networks Security Week News
NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million Security Week News
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment Security Week News
Claude AI APIs Can Be Abused for Data Exfiltration Security Week News
West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – Android and Cisco 0-Day, Teams Flaws, HackedGPT, and Whisper Leak
  • New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic
  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – Android and Cisco 0-Day, Teams Flaws, HackedGPT, and Whisper Leak
  • New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic
  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News