Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Threat Actors

Magnet Goblin – Threat Actor

March 13, 2024
Reading Time: 3 mins read
in Threat Actors
Magnet Goblin – Threat Actor
 

Magnet Goblin

Other Names

Uknown

Location

Uknown

Date of initial activity

2022

Suspected attribution

Uknown

Associated Groups

Uknown

Motivation

Financial Gain

Associated tools

NerbianRAT, MiniNerbian, WARPWIRE

Active

Yes

Overview

Magnet Goblin is a financially motivated threat actor who quickly leverages 1-day vulnerabilities, often in edge devices, after their disclosure. The actor uses malware belonging to a custom malware family called Nerbian. This family includes NerbianRAT, a cross-platform RAT with variants for Windows and Linux, and MiniNerbian, a small Linux backdoor.

Common targets

Some of the devices or services targeted by the hackers are Ivanti Connect Secure (CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, CVE-2024-21893), Apache ActiveMQ, ConnectWise ScreenConnect, Qlik Sense (CVE-2023-41265, CVE-2023-41266, CVE-2023-48365), and Magento (CVE-2022-24086).

Attack Vectors

The threat actor quickly adopts and leverages 1-day vulnerabilities in public-facing services as an initial infection vector, and deploy custom malware on Windows and Linux systems.

1-day vulnerabilities are those publicly disclosed flaws for which a patch is already available. Cyber threat actors aiming to capitalize on these vulnerabilities must act swiftly before targets can implement security updates.

How they operate

The Check Point analysts who uncovered Magnet Goblin Deploys Nerbian RAT observe that these threat actors swiftly capitalize on recently disclosed vulnerabilities. In certain instances, they exploit these weaknesses within just a day of a Proof of Concept (PoC) exploit emerging. Magnet Goblin utilizes these vulnerabilities to infiltrate servers with tailored malware, including NerbianRAT and MiniNerbian, alongside a personalized version of the WARPWIRE JavaScript stealer.
NerbianRAT for Windows has been recognized since 2022, but Check Point recently uncovered a Linux variant, utilized by Magnet Goblin, in circulation since May 2022. Upon activation, this variant initiates basic operations, such as gathering system information (time, username, machine name), generating a bot ID, and configuring network communication through a hardcoded IP address. Following initialization, NerbianRAT loads its configuration settings, dictating activity schedules, communication intervals with the command and control (C2) server, and other operational parameters. The C2 server can then issue various commands to the malware, including executing Linux commands, modifying connection intervals, and updating configuration variables. MiniNerbian, a streamlined iteration of NerbianRAT, focuses primarily on executing commands and supports actions like relaying command results, updating activity schedules, and adjusting configurations. Unlike its more intricate counterpart, MiniNerbian communicates with the C2 server via HTTP, potentially serving as a redundancy or stealthier backdoor for Magnet Goblin’s operations.
References:
  • Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities
 
Tags: 1-day vulnerabilitiesAttackersMagnet GoblinMiniNerbianNerbianRATThreat ActorsWARPWIRE
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

nOAuth Flaw Allows Easy Account Takeover

Unpatchable Flaw In Hundreds Of Printers

Open VSX Flaw Allowed Extension Hijacks

Fake Job Offers Hide North Korean Malware

New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

Subscribe to our newsletter

    Latest Incidents

    Hawaiian Airlines Hit By Cyberattack

    Qilin Ransomware Gang Hacks Estes Freight

    Generali Customer Data Exposed In Hack

    Resupply DeFi Protocol Hacked For $9.6M

    Cyberattack Hits South Tyrol Emergency Ops

    UK’s Glasgow City Council Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial