Hackers are targeting outdated versions of the HTTP File Server (HFS) from Rejetto to deploy malware and cryptocurrency mining software. The vulnerability, identified as CVE-2024-23692, is a critical-severity issue that allows attackers to execute arbitrary commands without authentication. Affected versions include those up to and including 2.3m, and users are advised that these versions are “dangerous” and should no longer be used until a fix is available.
AhnLab researchers have observed active exploitation of the vulnerability in version 2.3m, which remains popular among individual users and small organizations. Attackers leverage the CVE-2024-23692 vulnerability to send specially crafted HTTP requests, executing arbitrary commands on compromised systems. This exploitation has been linked to various forms of malware deployment, including cryptocurrency miners and remote access tools.
During attacks, hackers often collect system information, install backdoors, and deploy cryptocurrency mining tools such as XMRig, which has been linked to the LemonDuck threat group. Additional payloads found in the attacks include XenoRAT, Gh0stRAT, PlugX, and GoThief, which are used for remote control, data exfiltration, and information stealing. These actions highlight the severe impact of the vulnerability on affected systems.
To mitigate risks, users should avoid using vulnerable versions of HFS and consider updating to version 0.52.x, the latest release that supports HTTPS, dynamic DNS, and enhanced authentication. The company has provided indicators of compromise, including malware hashes, attacker IP addresses, and download URLs, to help users identify and respond to these threats effectively.