ClickCease Hackers compromise servers by exploiting a security flaw in Zimbra
Cybersecurity News,

Hackers compromise nearly 900 servers by exploiting a security flaw in Zimbra

October 26, 2022
Hackers discover a security flaw in Zimbra

Hackers are exploiting a vulnerability tracked as CVE-2022-41352 in the Zimbra Collaboration Suite (ZCS). Already, threat actors were able to hack into almost 900 servers.

The proof-of-concept (PoC) of the vulnerability has been added to the Metasploit Framework, which allows unprofessional attackers to exploit the vulnerability.

Kaspersky researchers explained that an unknown APT that exploited the critical vulnerability had probably compiled a working exploit based on the publicly available information published on the Simbra forums.

The Zimbra vulnerability is a remote code execution flaw that allows an attacker to send an email with a malicious archive attachment that places a web shell in the Zimbra Collaboration Suite server while also bypassing antivirus in the process.

The Kaspersky researchers identified at least 876 servers that had been compromised by attackers exploiting the vulnerability before it was publicized. After it was reported, various threat groups also attempted to exploit the flaw.

Since it was reported, the rate of exploitation has increased. Although Zimbra has fixed a security issue with ZCS version 9.0.0 P27, attackers continue to launch opportunistic attacks to exploit the vulnerability.

According to Kaspersky, the first attacks that exploited vulnerable Zimbra servers began in September in India and Turkey. Researchers believe that the first wave of attacks was likely a test wave against low-interest targets to test its effectiveness.

The attackers compromised 44 servers during the first wave, and for the second wave, after the bug became public, the threat actors switched gears and began mass attacks, resulting in 832 servers being compromised with malicious webshells.

Security firm Volexity said about 1600 ZCS servers were compromised by threat actors after exploiting CVE-2022-41352 to plant webshells.

ZCS administrators who are yet to apply the available Zimbra security updates or workarounds are advised to do so immediately since threat actors are already actively exploiting the flaws.

The sources for this piece include an article in BleepingComputer.

Summary
Hackers compromise nearly 900 servers by exploiting a security flaw in Zimbra
Article Name
Hackers compromise nearly 900 servers by exploiting a security flaw in Zimbra
Description
Hackers are exploiting a vulnerability tracked as CVE-2022-41352 in the Zimbra Collaboration Suite (ZCS). Already, threat actors were able to hack into almost 900 servers.
Author
Publisher Name
Tuxcare
Publisher Logo

TuxCare can help you reduce your risk window to data exfiltration and other cyber security threats.

TALK TO A CYBERSECURITY EXPERT

Expert knowledge of Linux security tips,
live patching education, and Cybersecurity news.

Stay updated with the latest news and announcements from TuxCare.com

Related Articles

Bahamut deploys fake VPN apps...

ESET researchers discovered an ongoing campaign by the Bahamut APT...

December 9, 2022

Windows Server updates causes LSASS...

A memory leak bug on Local Security Authority Subsystem Service...

December 8, 2022

1,650 malicious Docker Hub images...

After discovering malicious behaviors in 1,652 of 250,000 unverified Linux...

December 7, 2022

Arm’s Mali GPU driver flaws...

Despite fixes released by the chipmaker, a set of five...

December 6, 2022

RansomExx malware offers new features...

The APT group DefrayX has launched a new version of...

December 5, 2022

DuckDuckGo launches beta version of...

DuckDuckGo, a privacy-focused search engine, has added an App Tracking...

December 2, 2022

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching