Exploitation de masse sur internet confirmée et détectée par Akamai:
"As early as one day after disclosure, the SIRT observed numerous exploit attempts to abuse this vulnerability, indicating high exploitability and quick adoption by threat actors.
The exploitations include command injection and multiple malware campaigns: Gh0st RAT, RedTail cryptominers, and XMRig."
(IoCs Inside)
👇
https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure
et la distribution géographique de ces détections (basées sur le readme10) des serveurs pwned sur internet confirme que la vulnérabilité affecte principalement les systèmes ayant la localisation en langues chinoise et japonaise
👀 ⬇️
https://www.onyphe.io/search?q=category%3Adatascan+%22READ_ME10.html%22
wallet
⬇️
https://btcscan.org/address/bc1qnuxx83nd4keeegrumtnu8kup8g02yzgff6z53legrumtnu8kup8g02yzgff6z53l
message IoC
⬇️
"send 0.1btc to my address:bc1qnuxx83nd4keeegrumtnu8kup8g02yzgff6z53l. contact email:[email protected],if you can't contact my email, please contact some data recovery company(suggest taobao.com), may they can contact to me .your id: "
#Cyberveille #CVE_2024_4577