Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems

Posted on August 19, 2025August 19, 2025 By CWS

Aug 19, 2025Ravie LakshmananLinux / Malware
Risk actors are exploiting an almost two-year-old safety flaw in Apache ActiveMQ to achieve persistent entry to cloud Linux techniques and deploy malware referred to as DripDropper.
However in an uncommon twist, the unknown attackers have been noticed patching the exploited vulnerability after securing preliminary entry to forestall additional exploitation by different adversaries and evade detection, Crimson Canary mentioned in a report shared with The Hacker Information.
“Comply with-on adversary command-and-control (C2) instruments different by endpoint and included Sliver, and Cloudflare Tunnels to keep up covert command and management over the long run,” researchers Christina Johns, Chris Brook, and Tyler Edmonds mentioned.
The assaults exploit a maximum-severity safety flaw in Apache ActiveMQ (CVE-2023-46604, CVSS rating: 10.0), a distant code execution vulnerability that might be exploited to run arbitrary shell instructions. It was addressed in late October 2023.

The safety defect has since come beneath heavy exploitation, with a number of risk actors leveraging it to deploy a variety of payloads, together with HelloKitty ransomware, Linux rootkits, GoTitan botnet malware, and Godzilla internet shell.
Within the assault exercise detected by Crimson Canary, the risk actors have been noticed leveraging the entry to change present sshd configurations to allow root login, granting them elevated entry to drop a beforehand unknown downloader dubbed DripDropper.
A PyInstaller Executable and Linkable Format (ELF) binary, DripDropper requires a password to run in a bid to withstand evaluation. It additionally communicated with an attacker-controlled Dropbox account, as soon as once more illustrating how risk actors are more and more counting on professional providers to mix in with common community exercise and sidestep detection.
The downloader in the end serves as a conduit for 2 recordsdata, certainly one of which facilitates a different set of actions on completely different endpoints, starting from course of monitoring to contacting Dropbox for additional directions. Persistence of the dropped file is achieved by modifying the 0anacron file current in /and so forth/cron.hourly, /and so forth/cron.day by day, /and so forth/cron.weekly, /and so forth/cron.month-to-month directories.

The second file dropped by DripDropper can be designed to contact Dropbox for receiving instructions, whereas additionally altering present configuration recordsdata associated to SSH, possible as a backup mechanism for persistent entry. The ultimate stage entails the attacker downloading from Apache Maven patches for CVE-2023-46604, successfully plugging the flaw.
“Patching the vulnerability doesn’t disrupt their operations as they already established different persistence mechanisms for continued entry,” the researchers mentioned.

Whereas actually uncommon, the approach isn’t new. Final month, France’s nationwide cybersecurity company ANSSI detailed a China-nexus preliminary entry dealer using the identical method to safe entry to techniques and stop different risk actors from utilizing the shortcomings to get in and masks the preliminary entry vector used within the first place.
The marketing campaign provides a well timed reminder for why organizations want to use patches in a well timed trend, restrict entry to inner providers by configuring ingress guidelines to trusted IP addresses or VPNs, and monitor logging for cloud environments to flag anomalous exercise.

The Hacker News Tags:ActiveMQ, Apache, Cloud, Deploy, DripDropper, Exploited, Flaw, Linux, Malware, Systems

Post navigation

Previous Post: OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5
Next Post: How Winning SOCs Always Stay Ahead of Threats 

Related Posts

Key Capabilities Security Leaders Need to Know The Hacker News
CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation The Hacker News
Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability The Hacker News
Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets The Hacker News
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark