PHP flaw abused to deploy sneaky Msupedge backdoor by hackers

August 21, 2024
1 min read



TLDR:

– Hackers exploited a PHP vulnerability (CVE-2024-4577) to deploy a new backdoor named Msupedge.

– Msupedge communicates with a C&C server via DNS traffic and can execute commands through DNS tunneling.

Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

A previously undocumented backdoor called Msupedge was used in a cyber attack targeting a university in Taiwan. The backdoor communicates with a C&C server via DNS traffic, making it stealthy and hard to detect. The attack vector involved exploiting a critical flaw in PHP (CVE-2024-4577) to achieve remote code execution.

Msupedge is a dynamic-link library installed in specific paths and can receive commands using DNS tunneling. It uses the resolved IP address of the C&C server to execute commands based on the third octet of the IP address.

The backdoor supports various commands, including creating processes, downloading files, and sleeping for intervals.

Another threat group, UTG-Q-010, has been linked to a phishing campaign distributing an open-source malware called Pupy RAT, which uses malicious .lnk files with embedded DLL loaders.


Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and