Lucene search

K
thnThe Hacker NewsTHN:9C1351CDC6CA8D01948CA07E89381032
HistoryMar 11, 2024 - 5:59 a.m.

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

2024-03-1105:59:00
The Hacker News
thehackernews.com
42
magnet goblin hacker
1-day exploit
nerbian rat
edge devices
public-facing servers
ivanti connect secure vpn
magento
qlik sense
apache activemq
proofpoint
darktrace
rat
mininerbian
linux malware
warpwire
ligolo
anydesk
screenconnect

8.2 High

AI Score

Confidence

Low

Magnet Goblin Hacker Group

A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities into its arsenal in order to opportunistically breach edge devices and public-facing services and deploy malware on compromised hosts.

“Threat actor group Magnet Goblin’s hallmark is its ability to swiftly leverage newly disclosed vulnerabilities, particularly targeting public-facing servers and edge devices,” Check Point said.

“In some cases, the deployment of the exploits is within 1 day after a [proof-of-concept] is published, significantly increasing the threat level posed by this actor.”

Cybersecurity

Attacks mounted by the adversary have leveraged unpatched Ivanti Connect Secure VPN, Magento, Qlik Sense, and possibly Apache ActiveMQ servers as an initial infection vector to gain unauthorized access. The group is said to be active since at least January 2022.

A successful exploitation is followed by the deployment of a cross-platform remote access trojan (RAT) dubbed Nerbian RAT, which was first disclosed by Proofpoint in May 2022, as well as its simplified variant called MiniNerbian. The use of the Linux version of Nerbian RAT was previously highlighted by Darktrace.

1-Day Vulnerabilities

Both the strains allow for execution of arbitrary commands received from a command-and-control (C2) server and exfiltrating the results backed to it.

Some of the other tools used by Magnet Goblin include the WARPWIRE JavaScript credential stealer, the Go-based tunneling software known as Ligolo, and legitimate remote desktop offerings such as AnyDesk and ScreenConnect.

Cybersecurity

“Magnet Goblin, whose campaigns appear to be financially motivated, has been quick to adopt 1-day vulnerabilities to deliver their custom Linux malware, Nerbian RAT and MiniNerbian,” the company said.

“Those tools have operated under the radar as they mostly reside on edge-devices. This is part of an ongoing trend for threat actors to target areas which until now have been left unprotected.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

8.2 High

AI Score

Confidence

Low