Hey there, techno-tects! Put down that cup of Java. Despite the name, we’re not discussing coffee break-times, but a rather brewing issue in the tech world. Which is, our dear open-source buddy, Apache ActiveMQ, has sprung a leak, and not just any ole leak, a security flaw! That’s right, it’s being actively exploited by the dark hats among us, and not to send us cute cat pictures. Trust me, I rechecked.
Who needs a pet dog or cat when you’ve got a Go-based botnet called GoTitan and a .NET program called PrCtrl Rat. However, these are not your friendly cuddly companion like Microsoft Clippy. They can remotely call home and commandeer the infected hosts. I know, I’d prefer the cat pictures too.
Let’s talk about the ‘bug’ in the room. These attacks use a remote code execution bug (naughty, naughty), with a catchy name: CVE-2023-46604, and its CVSS score is 10.0. If that score sounds like a perfect gymnastics move, it’s not. In the security world, it’s pretty much the equivalent of a faceplant.
To sum it up, if you’re using Apache ActiveMQ, you might need to pay some more attention to its security. There’s a security flaw that’s been exploited to distribute GoTitan and PrCtrl Rat, which aren’t as friendly as they sound. They’re exploiting a remote code execution bug with a CVSS score of 10.0, which makes the situation critically severe. Technically the Tom Cruise Mission Impossible kind of severe. Now, back to your regularly scheduled cat videos, and keep that software updated!
Original Article: https://thehackernews.com/2023/11/gotitan-botnet-spotted-exploiting.html
No products in the cart.