Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Symantec Warns of Apache Tomcat Server Worm

Apache Tomcat Server Backdoor Worm Squirming

Malware hunters at Symantec have intercepted a malicious backdoor worming its way though servers running the open-source Apache Tomcat servers. 

Apache Tomcat Server Backdoor Worm Squirming

Malware hunters at Symantec have intercepted a malicious backdoor worming its way though servers running the open-source Apache Tomcat servers. 

The backdoor worm, named Java.Tomdep by Symantec, acts as a Java servlet that is executed on Apache Tomcat. The malware does not affect client systems. Instead, it infects only the server and behaves as an IRC bot, connecting to an IRC server to send and receive commands sent from the attacker.

“Aside from standard commands such as download, upload, creating new process, SOCKS proxy, UDP flooding, and updating itself; compromised computers can also scan for other Tomcat servers and send the malware to them. It is thus possible that DDoS attacks from the compromised servers are the attacker’s purpose,” according to Symantec’s Security Response Team.

The malware uses weak usernames and passwords to worm its way through Tomcat servers. If successful, Java.Tomdep deploys itself to any Tomcat server it finds.

Java.Tomdep

Figure 1: How Java.Tomdep Spreads (Image Credit: Symantec)

Symantec says the attacker’s command and control (C&C) servers are located in Taiwan and Luxembourg. Infected Tomcat servers have been spotted in the U.S., U.K., Brazil and China.

“As far as we know, not many computers have fallen victim to this threat yet. However, in some cases, server computers don’t have antivirus products installed on them in the same way that personal computers would. Hopefully this isn’t a reason for the low rate of detection,” Symantec added.

Related Reading: Attackers Hide Communication With Linux Backdoor

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.

Malware & Threats

Fortinet warned of three malicious PyPI packages containing code that fetches the Wacatac trojan and information stealer.