Security News > 2024 > March > ScreenConnect flaws exploited to drop new ToddleShark malware

ScreenConnect flaws exploited to drop new ToddleShark malware
2024-03-04 22:14

The North Korean APT hacking group Kimsuky is exploiting ScreenConnect flaws, particularly CVE-2024-1708 and CVE-2024-1709, to infect targets with a new malware variant dubbed ToddleShark.

The threat actors are exploiting authentication bypass and remote code execution flaws disclosed on February 20, 2024, when ConnectWise urged ScreenConnect customers to immediately upgrade their servers to version 23.9.8 or later.

Kroll's analysts estimate that ToddleShark is a new variant of Kimsuky's BabyShark and ReconShark backdoors, previously seen targeting government organizations, research centers, universities, and think tanks in the United States, Europe, and Asia.

A notable ability of the new malware is polymorphism, which allows it to evade detection in many cases and make analysis more challenging.

CISA warns of Microsoft Streaming bug exploited in malware attacks.

New Bifrost malware for Linux mimics VMware domain for evasion.


News URL

https://www.bleepingcomputer.com/news/security/screenconnect-flaws-exploited-to-drop-new-toddleshark-malware/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2024-02-21 CVE-2024-1709 Unspecified vulnerability in Connectwise Screenconnect 22.7/23.8.4/23.8.5
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
network
low complexity
connectwise
critical
10.0
2024-02-21 CVE-2024-1708 Path Traversal vulnerability in Connectwise Screenconnect 22.7/23.8.4/23.8.5
ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.
network
low complexity
connectwise CWE-22
8.4