• HOME
  • GUEST POST
  • ABOUT US
  • CONTACT US
  • DISCLAIMER
  • PRIVACY POLICY
Thursday, November 13, 2025
No Result
View All Result
  • HOME
  • NEWS
    • POLITICS
  • BUSINESS
    • INTERNET MARKETING
  • FINANCE
    • CRYPTO
  • ENTERTAINMENT
    • MOVIE REVIEWS
  • SPORTS
    • CRICKET
    • FOOTBALL
    • WWE
  • TECH
  • HEALTH
  • TRAVEL
  • BLOG
    • AUTOMOBILE
    • CASINO
    • DEALS
    • LIFESTYLE
    • EDUCATION
  • HOME
  • NEWS
    • POLITICS
  • BUSINESS
    • INTERNET MARKETING
  • FINANCE
    • CRYPTO
  • ENTERTAINMENT
    • MOVIE REVIEWS
  • SPORTS
    • CRICKET
    • FOOTBALL
    • WWE
  • TECH
  • HEALTH
  • TRAVEL
  • BLOG
    • AUTOMOBILE
    • CASINO
    • DEALS
    • LIFESTYLE
    • EDUCATION
No Result
View All Result
Cover365
No Result
View All Result
Home NEWS

Hackers Exploited GeoServer Flaw to Breach US Federal Agency

by Bhuvana Salvi
2 months ago
in NEWS, TECH
Reading Time: 12 mins read
0 0
0
Share on FacebookShare on TwitterShare on WhatsAppShare on LinkedInShare on RedditShare on Pinterest

A critical flaw in widely used GeoServer software let hackers quietly infiltrate a major US government agency last year, raising fresh alarms about patching delays and weak cyber defenses inside federal networks.

Attackers Exploited a Known Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) confirmed this week that threat actors compromised a large federal civilian executive branch (FCEB) agency by exploiting CVE-2024-36401, a remote code execution bug in GeoServer. The flaw, disclosed on June 30, 2024, carried a near-maximum severity rating of 9.8.

CISA’s advisory revealed that the attackers gained access on July 11, less than two weeks after public disclosure of the flaw. Over the following three weeks, they exploited the same bug in a second GeoServer instance, then moved deeper into the network. The adversaries pivoted from mapping servers to a public web server and a SQL database, where they planted persistent backdoors.

GeoServer is an open source tool used across industries and governments to integrate and map geospatial data, from environmental research to military applications. The compromise shows how quickly a widely used tool can become an entry point when critical flaws are left unpatched.

us-federal-agency-breach-geoserver-flaw

How the Breach Unfolded

According to CISA, the attackers began with simple reconnaissance. They scanned the federal network using Burp Suite, a common penetration testing tool, and quickly identified vulnerable GeoServer instances exposed to the internet.

Once inside, they relied heavily on publicly available tools and scripts, a tactic known as “living off the land,” which makes malicious activity harder to detect.

  • On July 11, attackers exploited the first GeoServer server.

  • On July 24, they hit a second GeoServer, still unpatched despite being in the Known Exploited Vulnerabilities (KEV) catalog.

  • From there, they moved laterally to other systems, deploying China Chopper web shells and brute forcing account credentials.

The intruders also attempted to escalate privileges with the long-known Dirty Cow vulnerability (CVE-2016-5195) and used Stowaway, a proxy tool that allowed them to control traffic and maintain hidden communication channels.

For three weeks, the activity went largely unnoticed because the agency failed to act on existing alerts and lacked complete endpoint protections.

Broader Exploitation of the Flaw

The US government agency was not the only victim. Cybersecurity researchers observed widespread abuse of CVE-2024-36401 last summer.

  • In September 2024, Fortinet reported multiple campaigns targeting the bug, with attackers deploying botnets and cryptocurrency mining malware.

  • Trend Micro linked exploitation of the flaw to Earth Baxia, a China-linked espionage group. Its analysts documented intrusions against Taiwanese government agencies and the militaries of the Philippines and Japan.

Despite these links, CISA did not attribute the US incident to any known group, underlining the difficulty of pinning down responsibility when attackers use common tools and techniques.

Weaknesses in Federal Cyber Defenses

CISA’s after-action review paints a troubling picture of the breached agency’s defenses.

The advisory cited three major shortcomings:

  1. Failure to patch quickly: Even after CISA placed the flaw in its KEV catalog on July 15, the agency did not remediate its second vulnerable GeoServer.

  2. Weak incident response: The agency’s playbook was outdated and untested. It lacked clear processes for engaging outside responders and could not provide CISA analysts with needed access to its security systems.

  3. Inadequate monitoring: Endpoint detection alerts were ignored. Some critical servers, including the compromised web server, were left unprotected entirely.

CISA noted that these gaps gave attackers time and space to establish persistence. The failure to monitor an alert on July 15 was a missed chance to catch the breach early.

What Organizations Should Learn

The incident underscores the urgency of addressing known exploited vulnerabilities, especially those rated critical. CISA has urged both government agencies and private companies to:

  • Establish and enforce a clear vulnerability management plan with priority on KEV-listed flaws.

  • Maintain and routinely test incident response plans to ensure they can be executed under real-world pressure.

  • Implement complete and detailed logging to allow investigators to track attacker behavior.

Key Dates in the Breach Event
June 30, 2024 GeoServer flaw CVE-2024-36401 disclosed
July 11, 2024 Attackers exploited first GeoServer at federal agency
July 15, 2024 CISA added flaw to KEV catalog
July 24, 2024 Attackers exploited second GeoServer at same agency

This sequence shows how just two weeks of delay in patching created a window for attackers to infiltrate a sensitive US system.

The breach also illustrates a broader truth: cybersecurity risk does not end with deploying modern tools. Agencies and companies alike must maintain constant vigilance, patch rapidly, and ensure teams are ready to respond the moment a threat surfaces.

The CISA disclosure is yet another warning that in the fast-moving world of cyber threats, failure to act quickly can turn a known problem into a damaging breach.

The federal agency incident is a cautionary tale not just for government networks but for every organization relying on open source systems to manage critical data.

The story raises pressing questions: Are public institutions adapting fast enough to threats that spread worldwide in days? And what changes are needed to ensure similar mistakes are not repeated?

Bhuvana Salvi

Bhuvana Salvi

Bhuvana Salvi is a content writer with a passion for all things gaming. With a knack for crafting engaging and informative articles, Bhuvana has become a trusted expert in the gaming niche, providing valuable insights and captivating stories for gamers worldwide.

Related Posts

Zarine Khan portrait
ENTERTAINMENT

Bollywood Mourns Zarine Khan’s Sudden Death at 81

5 days ago
Bira 91
FINANCE

Bira 91 Founder Eyes Asset Sale to Tackle Cash Crunch

5 days ago
Discover how realme GT 8 Pro's Ricoh GR camera tech revolutionizes smartphone photos with pro optics and AI power
NEWS

Realme GT 8 Pro Unleashes Ricoh GR Camera Magic in Flagship Debut

6 days ago
Hyperliquid’s HIP-5 proposal sparks
NEWS

Hyperliquid Faces Sharp Debate Over HIP-5 Ecosystem Fund Proposal

7 days ago
Gold prices in India surge near Rs 1.22 lakh on Nov 6
FINANCE

Gold Prices Surge in India as Global Uncertainty Fuels Demand

7 days ago
Veteran actor Satish Shah
ENTERTAINMENT

Beloved Actor Satish Shah Passes Away at 74 After Kidney Failure

2 weeks ago
Next Post
boney-kapoor-sridevi-mona-family-unity

Boney Kapoor Opens Up About His Marriage to Sridevi and Bond with Mona Shourie

Elon Musk nears $500 billion net worth

Elon Musk Nears $500 Billion Net Worth as Tesla Soars

SEARCH NEWS

No Result
View All Result

RECENT NEWS

  • Bollywood Mourns Zarine Khan’s Sudden Death at 81
  • Bira 91 Founder Eyes Asset Sale to Tackle Cash Crunch
  • Realme GT 8 Pro Unleashes Ricoh GR Camera Magic in Flagship Debut
  • Hyperliquid Faces Sharp Debate Over HIP-5 Ecosystem Fund Proposal
  • Gold Prices Surge in India as Global Uncertainty Fuels Demand
  • Beloved Actor Satish Shah Passes Away at 74 After Kidney Failure
  • India’s Gold Demand Falls 16% as Record Prices Hit Jewellery Sales
  • Cheryl Burke Opens Up About Her 41-Pound Weight Loss Journey
  • UPS cuts 48,000 jobs as part of major business overhaul
  • Deepika Padukone and Ranveer Singh Reveal Daughter Dua on Diwali

ABOUT US

Cover365 Footer Logo

We are Google news approved website from India run by Group of Bloggers. We cover trending news topics and explore in-depth about the topics.

If you would like to promote your business or ads in our website, You can Contact us anytime at ceo.cover365@gmail.com

ADVERTISEMENT

We charge nominal cost to promote your business in our website. We accept following promotions that will help your business and improve your website SEO.

  • ADVERTISE
  • GUEST POST
  • SPONSORED ARTICLE
  • WRITE FOR US
  • HOMEPAGE LINKS
  • BANNER ADS
  • PRESS RELEASE

POPULAR CATEGORIES

Popular Categories in our website,

  • BUSINESS
  • FINANCE
  • CRYPTO
  • ENTERTAINMENT
  • SPORTS
  • EDUCATION
  • TECH
  • HEALTH
  • LIFESTYLE
  • TRAVEL
  • CASINO

SEARCH WEBSITE

No Result
View All Result

WEBSITE STATS

Cover365 Monthly Stats: (Will be updated every month)

  • Traffic: 100,000+ / Month
  • Website Age: 12 Years+
  • Google News Approved
  • 4+ Active Writers
  • High Quality Articles
  • HOME
  • GUEST POST
  • ABOUT US
  • CONTACT US
  • DISCLAIMER
  • PRIVACY POLICY

© 2023 Cover365

No Result
View All Result
  • HOME
  • NEWS
    • POLITICS
  • BUSINESS
    • INTERNET MARKETING
  • FINANCE
    • CRYPTO
  • ENTERTAINMENT
    • MOVIE REVIEWS
  • SPORTS
    • CRICKET
    • FOOTBALL
    • WWE
  • TECH
  • HEALTH
  • TRAVEL
  • BLOG
    • AUTOMOBILE
    • CASINO
    • DEALS
    • LIFESTYLE
    • EDUCATION

© 2023 Cover365

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist