iTnews Asia
  • Home
  • News
  • Security

Malware spotted on Barracuda email gateways

Malware spotted on Barracuda email gateways

CISA issues new warning.

By Richard Chirgwin on Jul 31, 2023 12:30PM

The need to replace Barracuda email gateways has taken on a new urgency, with America’s Computer and Infrastructure Security Agency (CISA) warning it has identified three malware variants planted on vulnerable devices.

Earlier this year, Barracuda advised that a remote code execution bug (CVE-2023-2868) in some of its email security gateways required affected devices to be replaced.

Some units clearly remain in service, and CISA has warned it has identified three malware variants it has spotted on Barracuda devices.

The first is a payload attackers use to drop and execute a reverse shell on the ESG appliance.

This was used to download a second backdoor, dubbed SEASPY, from the command and control (C2) server.

CISA described SEASPY as a passive, persistent backdoor masquerading as a legitimate Barracuda service, monitoring traffic from the C2 server. 

When the server sent a particular packet sequence, SEASPY established a TCP reverse shell to the C2 server, giving the threat actors the ability to execute arbitrary commands on the appliance.

CISA described the third malware variant, SUBMARINE, as a “novel persistent backdoor” that was planted in an SQL database on the appliance, and executed with root privileges.

“SUBMARINE comprises multiple artifacts—including a SQL trigger, shell scripts, and a loaded library for a Linux daemon—that together enable execution with root privileges, persistence, command and control, and cleanup,” CISA said.

“This malware poses a severe threat for lateral movement.”

The advisory includes compromise indicators, and YARA detection rules for all three malware variants.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
barracuda cisa cve20232868 seaspy security submarine

Related Articles

  • Best practice tips for secure password management
  • Are third-party blind spots the weakest link in enterprise cybersecurity chain?
  • Five tips a CIO or CSO should know to stop employee-driven IP theft
  • StarHub launches app to protect customers from scam calls and SMS
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Philippine education ministry hit by data leak exposing 210,020 records

Philippine education ministry hit by data leak exposing 210,020 records

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.