Sunday Edition - Sunday Edition: Perimeter Problems, Patching Frenzy
This week was a buffet of the usual suspects: exposed admin panels, edge gear with “please shell me” banners, an enterprise zero-day pressed into extortion, and AI browsers quietly auditioning for “Shadow IT: The Musical.” If you manage anything with a WAN IP or an upload handler, this was not the week to be on PTO.
Actively Exploited, Right Now
Oracle E‑Business Suite zero‑day confirmed: CL0P, GOLDVEIN → SAGE, and extortion
KryptoKat: Google’s Threat Intelligence team and Mandiant confirmed mass exploitation of CVE-2025-61882
in Oracle E‑Business Suite, hitting UiServlet
/SyncServlet
for unauthenticated RCE. Post‑compromise, attackers deploy a Java implant chain (GOLDVEIN downloader → SAGE loader—variants like SAGEGIFT/SAGELEAF/SAGEWAVE) with an in‑memory servlet filter to live off the land as the applmgr
account. It’s tied to CL0P‑branded extortion threatening to leak stolen EBS data. Oracle shipped emergency patches Oct 4–5; apply them yesterday (Oracle Security Alert, GTIG/Mandiant, NVD).
What to do next:
- Patch all EBS instances and yank public access to
UiServlet
/SyncServlet
. Require VPN/jump hosts and IP allow‑lists. - Hunt in DB for abused templates: query
XDO_TEMPLATES_B
/XDO_LOBS
for odd entries (TemplateCode startingTMP/DEF
) and reviewTemplatePreviewPG
hits. - Memory forensics on Java procs for in‑memory loaders; use GTIG YARA for GOLDVEIN/SAGE.
- Block C2s: domains
pubstorm.com
,pubstorm.net
; IPs200.107.207.26
,185.181.60.11
,161.97.99.49
,162.55.17.215
,104.194.11.200
. - Watch for Java spawning shells (
bash -i
) and outbound data trickles; rotate any credentials that could be downstream of the app.
RondoDox botnet: “exploit shotgun” keeps firing
UncleSp1d3r: RondoDox continues mass‑scanning WAN admin panels on routers, DVR/NVRs, CCTV, and random embedded web servers, then pelting them with ~50–56 n‑days until something cracks. Successful hits hand off to a multi‑arch loader that fetches RondoDox ± Mirai/Morte for DDoS/mining and opportunistic pivoting. New reporting includes hashes/IPs and a published IOC list—use it (Trend Micro, IOC list, DarkReading). CVEs in play include CVE-2023-1389
, CVE-2024-3721
, CVE-2024-12856
, plus newcomers like CVE-2025-7414
and CVE-2025-5504
.
Immediate actions:
- Block public management (HTTP/HTTPS/Telnet/SSH). Gate via VPN/jumps; allow‑list admin IPs.
- Patch firmware; prioritize KEV and Trend’s callouts. Where vendors are MIA, virtual patch with WAF/IPS for traversal/command‑injection patterns.
- Hunt for shells spawned by web processes and loader breadcrumbs: “#!/bin/sh”, “chmod 777”, “curl|sh”, rapid file drops.
- Egress controls for odd HTTP/UDP floods and rotating C2 IPs (
74.194.191.52
,83.252.42.112
,38.59.219.27
,14.103.145.202
); sample hashes:24b96599…
,16003678…
,6a77842d…
.
phpMyAdmin log‑poisoning → AntSword → Nezha (RMM) → Ghost RAT
KryptoKat: Huntress documented a campaign abusing internet‑exposed phpMyAdmin with MariaDB general_log
to write a PHP web shell, then driving AntSword to fetch Nezha (legit monitoring agent repurposed as an RMM) and stage Ghost RAT. Post‑compromise, we’ve seen Defender tampering (Add‑MpPreference
exclusions), a persistence service misspelled SQLlite
, DLL side‑loading, and encrypted C2. Over 100 victims, heavy in East Asia (Huntress, Infosecurity).
Block/hunt highlights:
- Kill WAN exposure for phpMyAdmin. Require VPN + strong auth; disable
general_log
in production. - Monitor for web shell POSTs (e.g.,
/htdocs/123.php
), httpd/IIS child processes launchingcurl
/powershell.exe
. - C2s:
rism.pages.dev
,c.mid.al
,gd.bj2.xyz
; IPs54.46.50.255
,45.207.220.12
,172.245.52.169
,38.246.250.201
. - Host clues: services named
SQLlite
, files underC:\Windows\Cursors\
, mutexgd.bj2[.]xyz:53762:SQLlite
.
Urgent Patch/Protect
Gladinet CentreStack & Triofox CVE-2025-11371
: LFI → ViewState deserialization RCE
KryptoKat: Actively exploited, unauthenticated LFI lets attackers read Web.config
, lift machine keys, and pivot into a ViewState deserialization RCE on the web tier. Huntress has incidents in hand and a vendor‑endorsed workaround while patches bake: disable the temp
handler in UploadDownloadProxy\Web.config
. Expect some feature impact; it’s better than feature‑complete backdoors (Huntress, NVD).
Checklist:
- Pull these portals off the internet; force VPN/allow‑listed admin IPs.
- Apply the
temp
handler workaround atC:\Program Files (x86)\Gladinet Cloud Enterprise\UploadDownloadProxy\Web.config
. - Rotate machine/app keys and anything in
Web.config
/backups; hunt for web shells and ViewState tampering artifacts; add WAF/IPS for LFI patterns.
SonicWall, two ways: cloud backup access + Akira on SSL VPNs
UncleSp1d3r: SonicWall confirmed an intruder accessed configuration backups stored in MySonicWall’s cloud backup service—if you used it, assume your configs are in the wild. At the same time, Akira operators are exploiting CVE-2024-40766
on SonicWall SSL VPNs for initial access before the usual smash‑and‑encrypt routine. It’s a lousy pairing: exposed configs plus unpatched VPNs equals easy mode (SonicWall advisory, CISA, Rapid7, Arctic Wolf).
Do now:
- Rotate everything in backups: admin creds, VPN PSKs, RADIUS/LDAP binds, API tokens, certs/keys; consider disabling cloud backups until validated.
- Patch for
CVE-2024-40766
; if you can’t, restrict SSL VPN access via IP allow‑lists or choke‑point a separate ingress VPN/jump. - Enforce MFA, revoke suspect OTP seeds; comb VPN/firewall logs for odd logins and short pre‑ransom dwell.
- Watch for rapid lateral movement and exfil indicators; contain egress from segments with VPN exposure.
Espionage & Targeted Phishing
SideWinder’s “Operation SouthNet”: free‑hosting phishing at scale
KryptoKat: SideWinder is working the South Asia beat with tailored Outlook/Zimbra lures and more than 50 credential‑harvesting portals on Netlify, pages.dev
, workers.dev
, b4a.run
, and friends. They’re also staging payloads in open directories—because if it’s free and public, someone will eventually weaponize it. Expect credential theft → staged malware → long‑dwell espionage (OTX pulse, Hunt.io).
Practical mitigations:
- Phishing‑resistant MFA (FIDO2) for webmail/admin; block external auto‑forwards; kill legacy auth.
- Treat free‑hosting URLs as risky by default; URL rewriting/inspection and rate limits on mass‑clicked links.
- Gateway rules/YARA for credential forms; monitor clusters of similar lures to the same org.
AI‑Adjacent Weirdness
SquareX: AI browsers and agent workflows widen the blast radius
KryptoKat: SquareX dunked on “AI browsers” this week, showing how agent workflows can quietly abuse OAuth consent, silently fetch malware, and mass‑share malicious links through semi‑trusted UI flows. None of this requires a zero‑day—just enthusiastic automation with too much reach, too few guardrails. Treat agentic browsers like you would any new endpoint platform: constrained, monitored, and subject to the same governance you apply to extensions and proxies (SquareX, Security Boulevard).
Programmatic fixes:
- Inventory and, where possible, disable agent features; require enterprise‑signed extensions.
- Harden OAuth: minimal scopes, incremental consent, short‑lived tokens, revocation on anomaly; instrument proxies/SSE to flag agent‑initiated OAuth and odd download bursts.
- Isolate high‑value SaaS workflows in managed/isolated browsers; block unapproved AI browsers from sensitive apps.
Heads‑Up: Coordinated Disclosure Brewing
ZDI‑CAN‑28255 — “All Hands” (CVSS 7.8), long fuse
KryptoKat: ZDI posted an upcoming advisory for All Hands with a 7.8 CVSS and an extended deadline to 2026‑02‑06. No technicals yet, no exploitation noted, but the risk profile screams “don’t expose this to the internet.” Inventory instances, clamp down access, and set WAF/IPS tripwires while you wait (ZDI Upcoming Advisories).
IOC quick‑grab
- Oracle EBS
CVE-2025-61882
C2:pubstorm.com
,pubstorm.net
; IPs200.107.207.26
,185.181.60.11
,161.97.99.49
,162.55.17.215
,104.194.11.200
. Sample hashes:76b6d36e…
,aa0d3859…
,6fd538e4…
. - RondoDox: IPs
74.194.191.52
,83.252.42.112
,38.59.219.27
,14.103.145.202
. See Trend’s full IOC list. - phpMyAdmin/Nezha/Ghost: domains
rism.pages.dev
,c.mid.al
,gd.bj2.xyz
; IPs54.46.50.255
,45.207.220.12
,172.245.52.169
,38.246.250.201
. Hashes:f3570bb6…
,9f33095a…
,7b2599ed…
,82611e60…
,35e0b221…
.
The week in one breath
- Patch Oracle EBS and lock
UiServlet
/SyncServlet
behind VPN/jumps. Hunt XDO template abuse and in‑memory loaders. - Pull CentreStack/Triofox off the internet, apply the
temp
handler workaround, and rotate keys. - Restrict WAN management across edge fleets. Patch or virtually patch RondoDox‑favored CVEs.
- Rotate SonicWall creds/PSKs/API tokens; patch SSL VPN (
CVE-2024-40766
), tighten access, and review logs for Akira‑ish activity. - Delete public phpMyAdmin from your life. Hunt AntSword/Nezha/Ghost RAT traces.
- Treat AI browsers like an untrusted new platform: scope, govern, and monitor OAuth+downloads.
Closing thoughts: It is a truth universally acknowledged, that a publicly exposed admin interface in possession of a good banner, must be in want of an exploit. Spend your Monday making that untrue. We’ll bring the tea; you bring the ACLs.
— Kat & Sp1d3r