Magnet Goblin Group Exploits 1-Day Vulnerabilities to Deploy Custom Linux Malware

1 min read
Source: The Hacker News
Magnet Goblin Group Exploits 1-Day Vulnerabilities to Deploy Custom Linux Malware
Photo: The Hacker News
TL;DR Summary

The financially motivated threat actor group Magnet Goblin is rapidly incorporating one-day security vulnerabilities to breach edge devices and public-facing services, deploying the Nerbian RAT and MiniNerbian on compromised hosts. Their attacks have targeted unpatched Ivanti Connect Secure VPN, Magento, Qlik Sense, and possibly Apache ActiveMQ servers, with the group active since at least January 2022. The deployed malware allows for execution of arbitrary commands and exfiltration of results to a command-and-control server, with the group also utilizing tools such as WARPWIRE JavaScript credential stealer, Ligolo tunneling software, and legitimate remote desktop offerings.

Share this article

Reading Insights

Total Reads

0

Unique Readers

0

Time Saved

1 min

vs 2 min read

Condensed

70%

31293 words

Want the full story? Read the original article

Read on The Hacker News