• HOME
  • GUEST POST
  • ABOUT US
  • CONTACT US
  • DISCLAIMER
  • PRIVACY POLICY
Thursday, March 12, 2026
No Result
View All Result
  • HOME
  • NEWS
    • POLITICS
  • BUSINESS
    • INTERNET MARKETING
  • FINANCE
    • CRYPTO
  • ENTERTAINMENT
    • MOVIE REVIEWS
  • SPORTS
    • CRICKET
    • FOOTBALL
    • WWE
  • TECH
  • HEALTH
  • TRAVEL
  • BLOG
    • AUTOMOBILE
    • CASINO
    • DEALS
    • LIFESTYLE
    • EDUCATION
  • HOME
  • NEWS
    • POLITICS
  • BUSINESS
    • INTERNET MARKETING
  • FINANCE
    • CRYPTO
  • ENTERTAINMENT
    • MOVIE REVIEWS
  • SPORTS
    • CRICKET
    • FOOTBALL
    • WWE
  • TECH
  • HEALTH
  • TRAVEL
  • BLOG
    • AUTOMOBILE
    • CASINO
    • DEALS
    • LIFESTYLE
    • EDUCATION
No Result
View All Result
Cover365
No Result
View All Result
Home NEWS

Hackers Exploited GeoServer Flaw to Breach US Federal Agency

by Bhuvana Salvi
6 months ago
in NEWS, TECH
Reading Time: 12 mins read
0 0
0
Share on FacebookShare on TwitterShare on WhatsAppShare on LinkedInShare on RedditShare on Pinterest

A critical flaw in widely used GeoServer software let hackers quietly infiltrate a major US government agency last year, raising fresh alarms about patching delays and weak cyber defenses inside federal networks.

Attackers Exploited a Known Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) confirmed this week that threat actors compromised a large federal civilian executive branch (FCEB) agency by exploiting CVE-2024-36401, a remote code execution bug in GeoServer. The flaw, disclosed on June 30, 2024, carried a near-maximum severity rating of 9.8.

CISA’s advisory revealed that the attackers gained access on July 11, less than two weeks after public disclosure of the flaw. Over the following three weeks, they exploited the same bug in a second GeoServer instance, then moved deeper into the network. The adversaries pivoted from mapping servers to a public web server and a SQL database, where they planted persistent backdoors.

GeoServer is an open source tool used across industries and governments to integrate and map geospatial data, from environmental research to military applications. The compromise shows how quickly a widely used tool can become an entry point when critical flaws are left unpatched.

us-federal-agency-breach-geoserver-flaw

How the Breach Unfolded

According to CISA, the attackers began with simple reconnaissance. They scanned the federal network using Burp Suite, a common penetration testing tool, and quickly identified vulnerable GeoServer instances exposed to the internet.

Once inside, they relied heavily on publicly available tools and scripts, a tactic known as “living off the land,” which makes malicious activity harder to detect.

  • On July 11, attackers exploited the first GeoServer server.

  • On July 24, they hit a second GeoServer, still unpatched despite being in the Known Exploited Vulnerabilities (KEV) catalog.

  • From there, they moved laterally to other systems, deploying China Chopper web shells and brute forcing account credentials.

The intruders also attempted to escalate privileges with the long-known Dirty Cow vulnerability (CVE-2016-5195) and used Stowaway, a proxy tool that allowed them to control traffic and maintain hidden communication channels.

For three weeks, the activity went largely unnoticed because the agency failed to act on existing alerts and lacked complete endpoint protections.

Broader Exploitation of the Flaw

The US government agency was not the only victim. Cybersecurity researchers observed widespread abuse of CVE-2024-36401 last summer.

  • In September 2024, Fortinet reported multiple campaigns targeting the bug, with attackers deploying botnets and cryptocurrency mining malware.

  • Trend Micro linked exploitation of the flaw to Earth Baxia, a China-linked espionage group. Its analysts documented intrusions against Taiwanese government agencies and the militaries of the Philippines and Japan.

Despite these links, CISA did not attribute the US incident to any known group, underlining the difficulty of pinning down responsibility when attackers use common tools and techniques.

Weaknesses in Federal Cyber Defenses

CISA’s after-action review paints a troubling picture of the breached agency’s defenses.

The advisory cited three major shortcomings:

  1. Failure to patch quickly: Even after CISA placed the flaw in its KEV catalog on July 15, the agency did not remediate its second vulnerable GeoServer.

  2. Weak incident response: The agency’s playbook was outdated and untested. It lacked clear processes for engaging outside responders and could not provide CISA analysts with needed access to its security systems.

  3. Inadequate monitoring: Endpoint detection alerts were ignored. Some critical servers, including the compromised web server, were left unprotected entirely.

CISA noted that these gaps gave attackers time and space to establish persistence. The failure to monitor an alert on July 15 was a missed chance to catch the breach early.

What Organizations Should Learn

The incident underscores the urgency of addressing known exploited vulnerabilities, especially those rated critical. CISA has urged both government agencies and private companies to:

  • Establish and enforce a clear vulnerability management plan with priority on KEV-listed flaws.

  • Maintain and routinely test incident response plans to ensure they can be executed under real-world pressure.

  • Implement complete and detailed logging to allow investigators to track attacker behavior.

Key Dates in the Breach Event
June 30, 2024 GeoServer flaw CVE-2024-36401 disclosed
July 11, 2024 Attackers exploited first GeoServer at federal agency
July 15, 2024 CISA added flaw to KEV catalog
July 24, 2024 Attackers exploited second GeoServer at same agency

This sequence shows how just two weeks of delay in patching created a window for attackers to infiltrate a sensitive US system.

The breach also illustrates a broader truth: cybersecurity risk does not end with deploying modern tools. Agencies and companies alike must maintain constant vigilance, patch rapidly, and ensure teams are ready to respond the moment a threat surfaces.

The CISA disclosure is yet another warning that in the fast-moving world of cyber threats, failure to act quickly can turn a known problem into a damaging breach.

The federal agency incident is a cautionary tale not just for government networks but for every organization relying on open source systems to manage critical data.

The story raises pressing questions: Are public institutions adapting fast enough to threats that spread worldwide in days? And what changes are needed to ensure similar mistakes are not repeated?

Bhuvana Salvi

Bhuvana Salvi

Bhuvana Salvi is a content writer with a passion for all things gaming. With a knack for crafting engaging and informative articles, Bhuvana has become a trusted expert in the gaming niche, providing valuable insights and captivating stories for gamers worldwide.

Related Posts

Bollywood icon Dharmendra
ENTERTAINMENT

Bollywood Legend Dharmendra Dies at 89: Final Words on Alcohol Struggle

3 months ago
Score the Apple MacBook Air M4
NEWS

MacBook Air M4 Price Plunges to Rs 55,911 in Black Friday Madness

3 months ago
Mitchell Starc dazzles in Ashes 2025-26
NEWS

Starc Strikes Early: Ashes Fireworks in Perth Opener

4 months ago
Anil Ambani's Reliance Group clarifies no ties to ED's Rs 1,452
FINANCE

Anil Ambani’s Reliance Group Sidesteps ED Storm in RCom Fraud Probe

4 months ago
Bollywood stars Rajkummar Rao and Patralekhaa
ENTERTAINMENT

Rajkummar Rao and Patralekhaa Welcome Baby Girl Joy

4 months ago
Gold rate in India dips
FINANCE

Gold Rate in India Pauses After Surge: 18K Eyes Rs 1 Lakh

4 months ago
Next Post
boney-kapoor-sridevi-mona-family-unity

Boney Kapoor Opens Up About His Marriage to Sridevi and Bond with Mona Shourie

Elon Musk nears $500 billion net worth

Elon Musk Nears $500 Billion Net Worth as Tesla Soars

SEARCH NEWS

No Result
View All Result

RECENT NEWS

  • Bollywood Legend Dharmendra Dies at 89: Final Words on Alcohol Struggle
  • MacBook Air M4 Price Plunges to Rs 55,911 in Black Friday Madness
  • Starc Strikes Early: Ashes Fireworks in Perth Opener
  • Anil Ambani’s Reliance Group Sidesteps ED Storm in RCom Fraud Probe
  • Rajkummar Rao and Patralekhaa Welcome Baby Girl Joy
  • Gold Rate in India Pauses After Surge: 18K Eyes Rs 1 Lakh
  • Dharmendra Discharged After Health Scare Wins Fan Hearts
  • Bihar Election 2025: NDA Sweeps Ahead, Stocks Tumble in Early Trade
  • Bollywood Mourns Zarine Khan’s Sudden Death at 81
  • Bira 91 Founder Eyes Asset Sale to Tackle Cash Crunch

ABOUT US

Cover365 Footer Logo

We are Google news approved website from India run by Group of Bloggers. We cover trending news topics and explore in-depth about the topics.

If you would like to promote your business or ads in our website, You can Contact us anytime at ceo.cover365@gmail.com

ADVERTISEMENT

We charge nominal cost to promote your business in our website. We accept following promotions that will help your business and improve your website SEO.

  • ADVERTISE
  • GUEST POST
  • SPONSORED ARTICLE
  • WRITE FOR US
  • HOMEPAGE LINKS
  • BANNER ADS
  • PRESS RELEASE

POPULAR CATEGORIES

Popular Categories in our website,

  • BUSINESS
  • FINANCE
  • CRYPTO
  • ENTERTAINMENT
  • SPORTS
  • EDUCATION
  • TECH
  • HEALTH
  • LIFESTYLE
  • TRAVEL
  • CASINO

SEARCH WEBSITE

No Result
View All Result

WEBSITE STATS

Cover365 Monthly Stats: (Will be updated every month)

  • Traffic: 100,000+ / Month
  • Website Age: 12 Years+
  • Google News Approved
  • 4+ Active Writers
  • High Quality Articles
  • HOME
  • GUEST POST
  • ABOUT US
  • CONTACT US
  • DISCLAIMER
  • PRIVACY POLICY

© 2023 Cover365

No Result
View All Result
  • HOME
  • NEWS
    • POLITICS
  • BUSINESS
    • INTERNET MARKETING
  • FINANCE
    • CRYPTO
  • ENTERTAINMENT
    • MOVIE REVIEWS
  • SPORTS
    • CRICKET
    • FOOTBALL
    • WWE
  • TECH
  • HEALTH
  • TRAVEL
  • BLOG
    • AUTOMOBILE
    • CASINO
    • DEALS
    • LIFESTYLE
    • EDUCATION

© 2023 Cover365

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist