Security Market Segment LS
Thursday, 21 December 2017 10:06

Malicious campaign targeting Struts uses leaked NSA exploits


Malicious attackers have launched a campaign aimed at the Apache Struts Web framework, and are using NSA exploits leaked by the Shadow Brokers to spread laterally on internal networks after compromising a system.

Researchers Maxim Zavodchik and Liron Segal of security firm F5 said they had dubbed the campaign Zealot based on the name of the zip file that contained the python scripts and the two NSA exploits, EternalBlue and EternalSynergy. These exploits were leaked by a group known as the Shadow Brokers.

The campaign targets both Windows and Linux systems and is claimed to be a sophisticated, highly obfuscated and multi-stage attack. Servers that are vulnerable to CVE-2071-5638 — an Apache Struts Jakarta Multipart Parser attack — and CVE-2017-9822 — a DotNetNuke content management system vulnerability — are coming under attack.

At present, Zealot uses the computing power of an infected system to mine the digital currency monero.

Hosts are scanned and two HTTP requests are then sent to the target. Payloads for both Windows and Linux are included. If the server is found to be vulnerable, then Zealot will run Java code to determine the operating system.

On a Linux system, shell commands are run in the background to fetch a script named larva which will then fetch a file called mule that is digital mining malware.

"If the detected OS is Windows, the STRUTS payload will run a PowerShell interpreter in a hidden mode, which will run a base64 encoded code. Once decoded two times, the result is another obfuscated script. Once de-obfuscated, it reveals a URL to another file to be downloaded from another domain," Zavodchik and Segal wrote.

The downloaded file is an even more heavily obfuscated PowerShell script “scv.ps1”. This deployer then downloads miner malware and runs it. It will then download the same malware as a DLL and use the reflective DLL injection technique to inject the malware into the PowerShell process for more stealth.

The malware then scans the internal network and uses the NSA exploits to spread laterally.

The two researchers said Zealot seemed to be the first Struts campaign using NSA exploits to propagate inside internal networks.

"There were other malware campaigns like NotPetya and WannaCry ransomware, and also the Adylkuzz cryptominer launching attacks by directly scanning the Internet for SMBs to exploit with the NSA tools the ShadowBrokers released," they said.

"The Zealot campaign, however, seems to be opening new attack vector doors, automatically delivering malware on internal networks via Web application vulnerabilities.

"The level of sophistication we are currently observing in the Zealot campaign is leading us to believe that the campaign was developed and is being run by threat actors several levels above common bot herders."

Subscribe to ITWIRE UPDATE Newsletter here


The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.



iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News