How Hackers Are Using Msupedge Malware to Infiltrate Windows Networks via PHP Exploit
In a recent surge of cyber threats, a newly discovered backdoor named Msupedge is being actively deployed by hackers to compromise Windows systems. This sophisticated malware was first identified on a university's network in Taiwan and is believed to exploit a critical PHP vulnerability, CVE-2024-4577, to gain unauthorized access and execute arbitrary code.
Table of Contents
The Vulnerability at the Core
CVE-2024-4577 is a severe flaw in the PHP-CGI (Common Gateway Interface) mode on Windows systems, patched in June 2024. This vulnerability allows attackers to inject arguments and execute arbitrary code remotely. The flaw is particularly concerning as it affects PHP installations running in CGI mode, making it a high-risk issue for systems that have not yet applied the patch. Exploiting this vulnerability can lead to a complete system compromise, enabling attackers to take full control of the targeted machine.
Msupedge: A New Breed of Malware
The Msupedge backdoor is particularly notable for its use of DNS traffic to communicate with its command-and-control (C&C) server, a technique that, while not new, is rarely seen in the wild. This method, known as DNS tunneling, leverages the dnscat2 tool to encapsulate data within DNS queries and responses, allowing the malware to receive commands from the attackers covertly.
Once inside the system, Msupedge can execute a range of commands, triggered by specific IP addresses associated with its C&C server. These commands include creating processes, downloading files, and managing temporary files, providing the attackers with a versatile tool to control and manipulate the compromised system.
The Attack in Action
According to Symantec's Threat Hunter Team, who investigated the incident, the initial intrusion into the Taiwanese university's network likely occurred through the exploitation of the CVE-2024-4577 vulnerability. The attackers deployed the Msupedge malware as two dynamic link libraries (DLLs), weblog.dll and wmiclnt.dll, with the former being loaded by the Apache httpd.exe process.
This attack is reminiscent of earlier incidents where similar PHP vulnerabilities were exploited, such as the CVE-2012-1823 flaw, which was used years after its patch to spread the RubyMiner malware. The persistence of such vulnerabilities highlights the importance of timely patching and the ongoing risks associated with legacy systems and unpatched software.
The Broader Threat Landscape
The discovery of Msupedge comes amid a broader trend of threat actors increasingly targeting newly discovered vulnerabilities with remarkable speed. Just one day after the PHP maintainers released the patch for CVE-2024-4577, security researchers observed widespread exploitation attempts, including by the notorious TellYouThePass ransomware gang.
These rapid exploitation efforts underscore the urgency for organizations to apply security patches as soon as they become available. Delays in patching can open the door to attacks like those involving Msupedge, which can have devastating consequences for compromised systems.
The emergence of Msupedge serves as a stark reminder of the evolving tactics used by cybercriminals to infiltrate systems and evade detection. By leveraging DNS tunneling and exploiting critical vulnerabilities, attackers continue to refine their methods, making it increasingly difficult for defenders to protect their networks. Organizations must remain vigilant, applying patches promptly, and employing advanced threat detection techniques to stay ahead of these emerging threats.








