Financially Motivated Group Magnet Goblin Exploits 1-Day Vulnerabilities with Custom Malware

by | Mar 12, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

The financially motivated hacking group Magnet Goblin has gained attention for its adoption and exploitation of 1-day vulnerabilities, as warned by CheckPoint. This threat actor focuses on targeting internet-facing services, with notable exploits including the vulnerability CVE-2024-21887 in Ivanti Connect Secure VPN. Remarkably, the group integrated this exploit into its toolkit within just one day after the publication of a proof of concept (POC).

In addition to Ivanti, Magnet Goblin has conducted multiple campaigns targeting vulnerabilities in Magento, Qlik Sense, and possibly Apache ActiveMQ. Notable vulnerabilities leveraged by the group include:

  • Magento: CVE-2022-24086
  • Qlik Sense: CVE-2023-41265, CVE-2023-41266, and CVE-2023-48365
  • Ivanti Connect Secure: CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, and CVE-2024-21893

One instance involving the exploitation of the Ivanti Connect Secure VPN vulnerability saw threat actors deploying a previously undetected Linux variant of malware named NerbianRAT, alongside a JavaScript credential stealer known as WARPWIRE.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

While the Windows version of NerbianRAT was first identified in 2022, the Linux variant employed by Magnet Goblin has been circulating since May 2022.

Magnet Goblin

Upon execution, the Linux NerbianRAT variant initiates a series of processes, including gathering system information, generating a unique bot ID, and establishing encrypted communication channels using raw TCP sockets. Unlike its Windows counterpart, the Linux version employs AES encryption for communication.

Below are the actions supported by the malware:

Action IDAction description
1Continue requesting more actions.
4Run a Linux command in a separate thread.
5Send the last command result and clean up the result file. ** If a command is running it is stopped.
6Run a Linux command immediately.
7Do nothing / Idle command.
8Change the connection interval global variable.
9Update the start and end worktimes, then save the config file.
14Send back the idle status timings string / the configuration / results of the last run Linux command.
15Set a config variable, based on the name of the field and a value.
16Update the gl_command_buffer global variable, used when executing commands from the C2.

Furthermore, Magnet Goblin has developed a simplified version of NerbianRAT, named MiniNerbian, which utilizes HTTP protocol for communication and supports actions such as executing C2 commands, updating activity schedules, and modifying configurations.

MiniNerbian, unlike NerbianRAT, communicates with the C2 server via HTTP protocol.




“Magnet Goblin, driven by financial motives, demonstrates a rapid adaptation to 1-day vulnerabilities, deploying their custom Linux malware, NerbianRAT and MiniNerbian,” concludes the report. “These tools operate discreetly, primarily targeting edge devices, reflecting an ongoing trend of threat actors targeting previously overlooked areas.”

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: securityaffairs.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This