Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack

Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack

Posted on February 25, 2026 By CWS

A significant security breach has occurred involving a vulnerability in Apache ActiveMQ, leading to a widespread deployment of LockBit ransomware on an enterprise network. This critical flaw, identified as CVE-2023-46604, permits remote code execution, which attackers exploited to gain access to an unprotected Windows server.

Exploitation of Apache ActiveMQ Vulnerability

The breach commenced in mid-February 2024, when malicious actors utilized the Apache ActiveMQ vulnerability to send a crafted OpenWire command to the publicly accessible server. This exploit prompted the server to load a remote Java Spring XML configuration file, instructing the compromised system to download a Metasploit stager via the Windows CertUtil tool. The stager then established a command-and-control connection to a server controlled by the attackers, rapidly escalating to SYSTEM-level privileges and extracting credentials from LSASS process memory.

Despite initial efforts to remove the attackers, the vulnerability remained unpatched, allowing them to return 18 days later. The attackers re-entered the network by exploiting the same vulnerability, only altering file names. A privileged service account, whose credentials were stolen during the first intrusion, facilitated their re-entry into the system.

Advanced Attack Techniques and Impact

Upon re-entry, attackers confirmed domain administrator access and used a disguised network scanning tool to identify active hosts. They deployed LockBit ransomware executables across servers and workstations via Remote Desktop Protocol (RDP) sessions. The ransomware was executed using specific commands on file servers, while simple execution was used on other machines. The attackers left ransom notes directing victims to the Session private messaging app, indicating a deviation from official LockBit channels.

The overall duration from initial breach to full encryption was 419 hours, or just over 19 days. Early detection of the intrusion was crucial, as the attackers would have required less than 90 minutes to initiate the ransomware execution upon re-entry.

Credential Theft and Defensive Measures

The initial breach involved accessing LSASS memory on several hosts, which was captured in Sysmon logs. This credential theft enabled lateral movement within the network and provided a pathway for the second intrusion. The attackers employed obfuscation techniques for PowerShell commands, using string concatenation and encoding to evade detection. On hosts with active Microsoft Defender, these activities were intercepted and blocked, though unprotected systems were compromised.

To maintain access, the attackers installed AnyDesk silently on the compromised host, configured for auto-start. A batch file manipulated firewall settings to open RDP connections, which were removed shortly after execution. System logs were cleared to conceal their presence, and Windows Defender was disabled on the Exchange server using a legitimate executable.

Security experts advise organizations to promptly patch Apache ActiveMQ to mitigate CVE-2023-46604. Additional recommendations include enforcing LSASS protection, monitoring for log clearing activities, restricting unauthorized remote tool installations, and resetting credentials post-intrusion to prevent further breaches.

Cyber Security News Tags:AnyDesk, Apache ActiveMQ, credential theft, CVE-2023-46604, Cybersecurity, LockBit, LSASS, Metasploit, network security, Ransomware, remote code execution, system vulnerabilities, Threat Actors

Post navigation

Previous Post: US Targets Exploit Brokers for Cyber Tool Theft
Next Post: CISA Alerts on FileZen Vulnerability Exploitation

Related Posts

ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine Cyber Security News
FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence FIN7 Hackers Using Windows SSH Backdoor to Establish Stealthy Remote Access and Persistence Cyber Security News
QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed Cyber Security News
Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities Cyber Security News
Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams Cyber Security News
Paragon Spyware Blunder: LinkedIn Post Reveals Control Panel Paragon Spyware Blunder: LinkedIn Post Reveals Control Panel Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News