A VMware bug with a severity rating of 9.8 was exploited to install a witch malware concoction

Hackers have been exploiting a now-patched vulnerability in VMware Workspace ONE Access in campaigns to install various ransomware and cryptocurrency miners, a researcher at security firm Fortinet said on Thursday.

CVE-2022-22954 is a remote code execution vulnerability in VMware Workspace ONE Access that has a severity rating of 9.8 out of a possible 10. VMware disclosed and patched the vulnerability on April 6. Within 48 hours, the hackers reverse-engineered the update and developed a working exploit that they then used to compromise servers that had yet to install the fix. Access to VMware Workspace ONE helps administrators configure a set of applications that employees need in their work environments.

In August, Fortiguard Labs researchers noted a sudden spike in exploit attempts and a major change in tactics. Whereas before hackers installed payloads that harvest passwords and collect other data, the new wave brought something else, specifically ransomware known as RAR1ransom, a cryptocurrency miner known as GuardMiner, and Mirai, software that corrals Linux devices into a massive botnet for use in Distributed Denial of Service Attacks.

FortiGuard

“Although the critical vulnerability CVE-2022-22954 was already patched in April, there are still several malware campaigns trying to exploit it,” wrote Cara Lin, a researcher at Fortiguard Labs. The attackers, she added, were using it to inject a payload and achieve remote code execution on servers running the product.

The Mirai sample Lin saw installed was downloaded from http[:]//107[.]189[.]8[.]21/pedalcheta/petite[.]x86_64 and relied on a command and control server in “cnc[.]good packages[.]DC. In addition to delivering junk traffic used in DDoSes, the sample also attempted to infect other devices by guessing the administrative password they used. After decoding strings in the code, Lin found the following list of credentials used by the malware:

hikvision

1234

windows1windows

S2fGqNFs

root

tsgoingon

new shine

12345

flaw

solo key

neworange88888888

guest

compartment

Username

new orange

system

059AnkJ

telnet administrator

tljwpbo6

iwkb

141388

123456

20150602

00000000

adaptec

20080826

vstarcam2015

v2mprt

Administrator

1001chin

vhd1206

support for

NULL

xc3511

QwestM0dem

7ujMko0admin

client-bbsd

vizxv

fidel123

dvr2580222

par0t

hg2x0

Samsung

t0talc0ntr0l4!

cablecom

hunting5759

router

zlxx

point of sale

flexion

administrator@mimifi

xmhdipc

icatch99

key code

evil

netopia

3com

DOCSIS_APP

hagpolm1

klv123

OxhlwSG8

In what appears to be a separate campaign, the attackers also exploited CVE-2022-22954 to download a 67-bit payload.[.]205[.]145[.]142. The payload included seven files:

  • phpupdate.exe – Xmrig Monero mining software
  • config.json – configuration file for mining pools
  • networkmanager.exe – executable used to scan and spread infections
  • phpguard.exe – executable used to keep the Xmrig guard miner running
  • init.ps1 – script file itself to maintain persistence by creating scheduled tasks
  • clean.bat – script file to remove other cryptominers on the compromised host
  • encrypt.exe: RAR1 ransomware

In the event that RAR1ransom has never been installed before, the payload would first execute the encrypt.exe executable file. The archive places the legitimate WinRAR data compression executable file in a Windows temporary folder. The ransomware then uses WinRAR to compress user data into password-protected archives.

The payload would then initiate the GuardMiner attack. GuardMiner is a cross-platform mining Trojan for the Monero coin. It has been active since 2020.

The attacks underscore the importance of installing security updates in a timely manner. Anyone who has not yet installed the VMware April 6 patch should do so immediately.

Leave a Reply

Your email address will not be published. Required fields are marked *