Today > 13 Critical | 36 High | 32 Medium vulnerabilities   -   You can now download lists of IOCs here!

Cleopatra's Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software

Dec. 13, 2024, 3:59 p.m.

Description

A mass exploitation campaign targeting Cleo Managed File Transfer (MFT) products was observed in December 2024. The attackers exploited a zero-day vulnerability to deploy a Java-based backdoor dubbed Cleopatra. The campaign began on December 7 and is ongoing. The attack chain involves an obfuscated PowerShell stager, a Java loader, and the Cleopatra backdoor. The backdoor supports cross-platform functionality on Windows and Linux, with specific features to access data within Cleo MFT software. Multiple IP addresses were used for command and control, while vulnerability scanning originated from only two IPs. The campaign appears opportunistic, affecting various industries. Affected Cleo products include Harmony, VLTrader, and LexiCom, even on patched versions.

Date

Published: Dec. 13, 2024, 12:40 p.m.

Created: Dec. 13, 2024, 12:40 p.m.

Modified: Dec. 13, 2024, 3:59 p.m.

Attack Patterns

T1135

T1082

T1033

T1049

T1190

T1059