Malware Actively Planted on Vulnerable Barracuda email gateways
Take action: It's high time to replace your vulnerable Barracuda ESG. Even if it's hidden behind another SMTP service, it's just a matter of time before it gets compromised. And if it's exposed on the internet, consider it already hacked.
Learn More
Replacing the vulnerable and very probably compromised Barracuda email gateways has become even more urgent due to the discoveryof three malicious software variants present on vulnerable devices. Barracuda had previously alerted about a remote code execution bug (CVE-2023-2868) in some of its email security gateways, which required replacement of affected devices.
Despite the advisory, some units continue to be in operation, and CISA has now identified the three malware variants found on Barracuda devices.
- The first malware serves as a payload, enabling attackers to execute a reverse shell on the ESG appliance,
- The second malware is a second backdoor called SEASPY is downloaded from the command and control (C2) server. Disguised as a legitimate Barracuda service, SEASPY acts as a passive, persistent backdoor that covertly monitors traffic from the C2 server. Upon receiving a specific packet sequence, SEASPY establishes a TCP reverse shell to the C2 server, granting threat actors the ability to execute arbitrary commands on the appliance.
- The third malware, SUBMARINE, is described as a novel and persistent backdoor that is implanted in an SQL database on the appliance and executed with root privileges. SUBMARINE utilizes multiple components, including a SQL trigger, shell scripts, and a loaded library for a Linux daemon, collectively facilitating execution with root privileges, command and control capabilities, and cleanup. CISA has highlighted that this malware presents a serious risk for lateral movement.