Cypho Logo

Neptune Loader: Exposing the Hidden Realms of Malware Command And Control / Vulnerability that exposes affected machines

Neptune Loader: Exposing the Hidden Realms of
      Malware Command And Control / Vulnerability that exposes affected machines

Introduction

This post talks about a vulnerability that we discovered in Neptune loader. Neptune loader is used for remotely controlling your device, it has some features that help attackers to easily use it. This vulnerability allows us to get information about the affected machines that are called bots. Neptune has a web interface that is used for control. We found a serious vulnerability. The post shares details that can help cybersecurity experts find and fix this weakness.

What is Neptune?

In the threat actor’s exact words : “Neptune is an innovative HTTP loader project that provides robust and efficient control over computer systems through commands administered via user-friendly web panel.” First seen date is 2023 November 22, user named “M0HX” shared a post on hackerforums.net and promoted a loader named Neptune.

Neptune Loader: Exposing the Hidden Realms of
      Malware Command And Control / Vulnerability that exposes affected machines

During our examination of Neptune loaders, we found something interesting. One of them has a backup file for a database (SQL).

Neptune Loader: Exposing the Hidden Realms of
      Malware Command And Control / Vulnerability that exposes affected machines

This file has default usernames and passwords. This discovery gives us important clues about how the loader is set up and might help us understand its security better. As we look into this more, we can learn more about possible issues and weaknesses related to this Neptune loader.

Neptune Loader: Exposing the Hidden Realms of
      Malware Command And Control / Vulnerability that exposes affected machines

We achieved success in cracking the password, overcoming the robust security measures implemented, specifically the encryption method known as bcrypt. Through a meticulous and resourceful process, our team employed advanced techniques and tools to crack the password successfully.

Neptune Loader: Exposing the Hidden Realms of
      Malware Command And Control / Vulnerability that exposes affected machines

Upon successfully gaining access to the loaders' dashboard, we conducted a thorough analysis of the application. The objective was to examine every aspect of the system, actively seeking out any potential vulnerabilities that could be exploited. After some time we discovered how our application collects information from the database.

Neptune Loader: Exposing the Hidden Realms of
      Malware Command And Control / Vulnerability that exposes affected machines

We discovered an important security vulnerability within the application, a Broken Access Control (Improper Session Management) issue. This vulnerability exposes a flaw in how the system manages user sessions, enabling unauthorized access to information related to affected machines(Bots). By exploiting this weakness, an unauthorized user gains visibility into sensitive data that should otherwise be restricted.

Neptune Loader: Exposing the Hidden Realms of
      Malware Command And Control / Vulnerability that exposes affected machines

The application uses AJAX requests to render a datatable containing the victim's data. A notable vulnerability was identified in the lack of session validation for the endpoint utilized in AJAX requests. This oversight meant that the application did not properly verify the session information, potentially exposing sensitive victim data to unauthorized access or manipulation.

Protecting Against Neptune Loader

Proactive Threat Mitigation: Use proactive measures by utilizing Indicators of Compromise (IoCs) to actively search for potential Neptune Loader infections within your IT environment. This strategic approach involves actively hunting for signs of compromise, allowing for timely detection and mitigation of potential security threats.

Comprehensive Cybersecurity Education: Implement a cybersecurity awareness training program designed to empower employees with the knowledge and skills to recognize and effectively cyber attacks. This educational initiative aims to enhance the overall cybersecurity resilience of the workforce, fostering a proactive and vigilant approach in safeguarding against potential threats posed by malware attacks.

Leverage Advanced Threat Intelligence: Utilize the CYPHO platform, an advanced threat intelligence tool, to enhance your cybersecurity defenses. This platform offers valuable insights and real-time information about emerging threats, enabling your organization to stay ahead of potential risks and bolster its overall security posture.

IOCs

1

94.156.65.54

2

mfuk.app

3

54.lan-za2-1.static.rozabg.com

4

tdboat.online

5

91.92.240.161

6

cf70fa1d010f0077ccb4ff039f3764c47756113a7bcc28acbdf96d6df56e9a7

7

2a3549512f5f9cf1b11a26897a79532adc548c3000fb7b07fcae6b49cd5222ad

Our Blog Posts

Stay informed with our latest blog posts

Subscribe for newsletter

Subscribe to us to keep up with the news