Hackers Exploiting Apache ActiveMQ Flaw to Breach Cloud-Based Linux Systems

Red Canary’s Threat Intelligence team has uncovered a sophisticated adversarial campaign where attackers exploit CVE-2023-46604 in Apache ActiveMQ to gain persistent access on cloud Linux systems, then strategically patch the exploited vulnerability to secure their foothold and evade detection from competing threat actors.

Advanced Post-Exploitation Tactics

The campaign demonstrates counterintuitive behavior where adversaries “fix” compromised systems after gaining remote access.

This dual-purpose strategy effectively locks out competing adversaries while obscuring the initial access technique, showcasing advanced operational security considerations in modern cyber warfare.

Red Canary detected adversaries executing reconnaissance commands on dozens of cloud-based Linux endpoints vulnerable to the critical remote code execution vulnerability CVE-2023-46604 in Apache ActiveMQ.

This widely-deployed open source message broker has been previously exploited for deploying TellYouThePass, Ransomhub, and HelloKitty ransomware variants, alongside Kinsing cryptomining malware.

DripDropper Technical Analysis

The adversaries deployed a varied command and control infrastructure, including Sliver implants and Cloudflare Tunnels for covert long-term access.

After exploiting endpoints and installing Sliver implants, attackers modified existing SSH daemon configurations to enable root login capabilities, typically disabled by default in modern Linux distributions.

Under elevated SSH sessions, adversaries downloaded and executed a previously unknown downloader designated “DripDropper”.

This encrypted PyInstaller ELF file requires password authentication for execution, effectively hindering automated sandbox analysis.

DripDropper communicates with adversary-controlled Dropbox accounts using hardcoded bearer tokens, leveraging legitimate cloud platforms for command and control operations.

The malware establishes persistence by modifying anacron configuration files across /etc/cron.*/ directories and altering SSH configuration files, including changing the default login shell for the games user account to /bin/sh.

This modification prepares systems for additional persistent access vectors through seemingly innocuous user accounts.

Vulnerability Patching Strategy

Following initial compromise, adversaries downloaded legitimate ActiveMQ JAR files from Apache Maven repositories, constituting an official patch for CVE-2023-46604.

By replacing existing vulnerable JAR files, attackers effectively remediated the exploited vulnerability, reducing detection probability through vulnerability scanners and preventing exploitation by competing threat actors.

ComponentTechnical Details
VulnerabilityCVE-2023-46604 (Apache ActiveMQ RCE)
EPSS Score94.44% exploitation probability (30 days)
Malware TypeEncrypted PyInstaller ELF
C2 InfrastructureDropbox, Sliver, Cloudflare Tunnels
Persistence MethodsSSH configuration modification, anacron scheduling
Target EnvironmentCloud-based Linux endpoints

Defensive Implications

This campaign underscores the sophistication of modern Linux-targeted operations, where adversaries implement multi-layered persistence mechanisms before self-remediating initial access vectors.

Organizations must implement policy-based SSH management, proactive vulnerability patching, network ingress controls, and comprehensive cloud logging to defend against such advanced persistent threats effectively.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here