InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Progress WhatsUp Gold Critical Flaw Exploited Just Hours After PoC Release
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Progress WhatsUp Gold Critical Flaw Exploited Just Hours After PoC Release
Technology

Progress WhatsUp Gold Critical Flaw Exploited Just Hours After PoC Release

September 14, 2024 3 Min Read
Share
Progress WhatsUp Gold
SHARE

Malicious actors may be leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to carry out opportunistic attacks.

The campaign is said to have begun on August 30, 2024, just five hours after Summoning Team security researcher Sina Kheirkhah released a PoC for CVE-2024-6670 (CVSS score: 9.8), who is also known for discovering and reporting CVE-2024-6671 (CVSS score: 9.8).

Both critical vulnerabilities, which could have allowed unauthenticated attackers to obtain users’ encrypted passwords, were patched by Progress in mid-August 2024.

“The timeline of events indicates that even though patches were available, some organizations failed to apply them quickly enough, leading to incidents shortly after the PoC was released,” Trend Micro researchers Hitomi Kimura and Maria Emreen Belay said in an analysis on Thursday.

The attacks observed by the cybersecurity firm include bypassing WhatsUp Gold authentication and exploiting Active Monitor PowerShell scripts to ultimately download various remote access tools to gain persistence on the Windows host.

This includes Atera Agent, Radmin, SimpleHelp Remote Access, and Splashtop Remote, with both Atera Agent and Splashtop Remote installed by a single MSI installer file retrieved from a remote server.

WhatsUp Gold Progress

“WhatsUp Gold’s executable polling process, NmPoller.exe, appears to be capable of hosting a script called Active Monitor PowerShell Script as a legitimate function,” the researchers explained. “The threat actors in this case chose to do this to perform remote arbitrary code execution.”

No further exploitation has been detected, however the use of multiple remote access software suggests a ransomware actor is responsible.

See also  How to investigate ChatGPT activity in Google Workspace

This is the second time a WhatsUp Gold security vulnerability has been weaponized in the wild: Early last month, the Shadowserver Foundation announced that it had seen exploitation attempts against CVE-2024-4885 (CVSS score: 9.8), another critical bug that was resolved by Progress in June 2024.

This disclosure comes a few weeks after Trend Micro revealed that threat actors were exploiting a security flaw in Atlassian’s Confluence Data Center and Confluence Server (CVE-2023-22527, CVSS score: 10.0) to deliver the Godzilla web shell. The vulnerability has since been patched.

“The CVE-2023-22527 vulnerability continues to be widely exploited by a variety of threat actors who leverage this vulnerability to carry out malicious activities, posing a significant security risk to organizations worldwide,” the company said.

Share This Article
Twitter Copy Link
Previous Article New Metroidvania "Spirit of Samurai" gives you total combo control New Metroidvania “Spirit of Samurai” gives you total combo control
Next Article Lights go out in MacArthur Park, residents fed up with empty promises Lights go out in MacArthur Park, residents fed up with empty promises
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The Solution is Cyber ​​Hygiene

The Solution is Cyber ​​Hygiene

Cybersecurity in healthcare has never been more urgent. As the…

September 19, 2024
mm

Enterprise LLM API: A top choice for powering LLM applications in 2024

Some big recent news stories have escalated the race for…

September 19, 2024
Authentication Bypass

GitLab fixes critical SAML authentication bypass vulnerability in CE and EE editions

GitLab has released a patch to address a critical flaw…

September 19, 2024
Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

A Chinese national has been indicted in the United States…

September 19, 2024
IoT Botnet

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

Cybersecurity researchers have discovered a never-before-seen botnet made up of…

September 18, 2024

You Might Also Like

Vic.ai Intelligence: Growth and profitability for finance teams
Technology

10 Best AI Accounting Tools (September 2024)

19 Min Read
TfL Cyber Attack
Technology

17-year-old boy arrested in connection with cyber attack affecting Transport for London

4 Min Read
New Linux Malware
Technology

New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency

3 Min Read
Post-Quantum Cryptography Defense
Technology

Google Chrome switches to ML-KEM for quantum cryptography defense

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?