Security VulnerabilitiesNews

ThinkPHP Exploit

A researcher at Akamai published an analysis of the ThinkPHP exploit that has activity been seen distributing malware in the wild.

The Akamai researcher came across an unknown payload during network traffic analysis. Analysis of this individual payload led to further research on ThinkPHP vulnerabilities being exploited in the wild. This vulnerability, CVE-2018-20062, when exploited, allows an unauthenticated attacker to perform remote code execution. Additionally, this vulnerability can be exploited on multiple operating systems so it has a wider pool of victims. Based on analysis of various exploit attempts, attackers are using this vulnerability to download and execute malicious payloads on victim hosts.

The payloads vary in purpose but, in general, Linux hosts are joined to a botnet while Windows hosts are infected with cryptomining software, web shells, and password cracking tools. For further details, see https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html

Indicators of Compromise

IPs

  • 167.99.219.142
  • 176.123.26.89
  • 27.98.193.224

URLs

  • http://27.98.193.224:8080/
  • http://a46.bulehero.in/download.exe

SHA256

Duncan

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.