A vulnerability initially exploited principally in cyberattacks in opposition to Japanese organizations is now a possible downside worldwide, researchers stated Friday.
Menace intelligence firm GreyNoise stated exploitation of the bug, tracked as CVE-2024-4577, “extends far past preliminary experiences,” referencing specifically a weblog submit printed Thursday by cybersecurity agency Cisco Talos.
The Cisco Talos crew had stated an unknown attacker was “predominantly focusing on organizations in Japan” in January by the vulnerability, which impacts a setup referred to as PHP-CGI that runs scripts on net servers. A patch was issued final summer season.
The attacker’s obvious objective was to steal entry credentials and doubtlessly set up persistence in a system, “indicating the probability of future assaults,” Cisco Talos stated.
GreyNoise stated it noticed related exercise past Japan, revealing “a far wider exploitation sample demanding instant motion from defenders globally.”
There are 79 recognized methods to take advantage of the vulnerability and remotely execute code on a compromised system, GreyNoise stated. The PHP scripting language is many years outdated and is extensively utilized in net growth.
“Assault makes an attempt have been noticed throughout a number of areas, with notable spikes in the US, Singapore, Japan, and different international locations all through January 2025,” Friday’s report stated.
Cisco Talos stated Thursday that the attacker it studied used a “command and management (C2) server that deploys a full suite of adversarial instruments and frameworks.” The researchers stated they believed the attacker’s motive was to maneuver past simply stealing credentials.
Researchers at Symantec had reported exploitation of CVE-2024-4577 in August, in opposition to a college in Taiwan, not lengthy after the patch was issued.
Recorded Future
Intelligence Cloud.
Study extra.