Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GeoServer Flaw Exploited in US Federal Agency Hack

Posted on September 24, 2025September 24, 2025 By CWS

The US cybersecurity company CISA has shared particulars on the exploitation of a year-old GeoServer vulnerability to compromise a federal civilian govt department (FCEB) company.

The exploited bug, tracked as CVE-2024-36401 (CVSS rating of 9.8) and resulting in distant code execution (RCE), was disclosed on June 30, 2024, two weeks earlier than CISA added it to the KEV catalog.

On July 11, 2024, 4 days earlier than CISA’s alert, a menace actor exploited the bug to realize entry to a GeoServer occasion pertaining to the sufferer company, then moved laterally to an online server and to an SQL server.

“On every server, they uploaded (or tried to add) net shells resembling China Chopper, together with scripts designed for distant entry, persistence, command execution, and privilege escalation. The cyber menace actors additionally used living-off-the-land (LOTL) strategies,” CISA explains in a recent report.

On July 24, ten days after the bug was added to the KEV checklist, the menace actor exploited the identical vulnerability in one other GeoServer occasion belonging to the identical company.

The attackers dropped net shells and created cron jobs and consumer accounts to take care of persistence, after which tried to escalate privileges, together with by exploiting the Soiled COW vulnerability within the Linux kernel.Commercial. Scroll to proceed studying.

“After compromising net service accounts, they escalated their native privileges to transition away from these service accounts (it’s unknown how they escalated privileges),” CISA explains.

The menace actor additionally used brute pressure assaults to acquire passwords permitting it to maneuver laterally and elevate privileges, carried out reconnaissance utilizing available instruments, downloaded payloads utilizing PowerShell, and deployed the Stowaway multi-level proxy software for command-and-control (C&C).

“The cyber menace actors remained undetected within the group’s setting for 3 weeks earlier than the group’s SOC recognized the compromise utilizing their EDR software,” CISA notes.

Based on the cybersecurity company, the sufferer was inside the KEV-required patching window for the GeoServer bug, however lacked procedures for bringing in third events for help, didn’t detect the exercise on July 15, 2024, when it missed an EDR alert on Stowaway, and didn’t have endpoint safety applied on the internet server.

Whereas CISA has not attributed the assault to a particular menace actor, the China Chopper net shell is usually utilized in assaults by China-linked menace actors resembling APT41 (Brass Storm), Gallium (Granite Storm), and Hafnium (Silk Storm).

Believed to have orchestrated final yr’s US Treasury hack, Silk Storm is thought for focusing on important infrastructure organizations worldwide, and for hacking a number of industries in North America.

“China Chopper has been round for over a decade, and it’s the identical net shell used within the 2021 Alternate assaults. The actual subject is that attackers chained a widely known exploit, moved laterally, and remained contained in the community for almost three weeks earlier than anybody observed, even with EDR deployed. That’s the trendy hazard we’re coping with. It’s not unique zero-days, however gaps that go unpatched and undetected till it’s too late,” Tuskira CEO and co-founder Piyush Sharma stated.

Associated: All Microsoft Entra Tenants Have been Uncovered to Silent Compromise by way of Invisible Actor Tokens: Researcher

Associated: SonicWall Updates SMA 100 Home equipment to Take away Overstep Malware

Associated: Sesame Workshop Regains Management of Elmo’s Hacked X Account After Racist Posts

Associated: How Do You Know If You’re Prepared for a Pink Crew Partnership?

Security Week News Tags:Agency, Exploited, Federal, Flaw, GeoServer, Hack

Post navigation

Previous Post: UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
Next Post: Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Related Posts

Seemplicity Raises $50 Million for Exposure Management Platform Security Week News
Ransomware Group Claims Attack on Belk Security Week News
Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform Security Week News
Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking Security Week News
China’s Salt Typhoon Hacked US National Guard Security Week News
Lumma Stealer Malware Returns After Takedown Attempt Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target Casino Operator Boyd Gaming
  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack
  • UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
  • European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target Casino Operator Boyd Gaming
  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack
  • UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
  • European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News