Connect with us

Security

Ransomware Gangs Exploit Critical Linux Vulnerability: Urgent Security Alert

Published

on

Recent reports from the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed that a critical privilege escalation vulnerability in the Linux kernel is currently being exploited in ransomware attacks.

The vulnerability, identified as CVE-2024-1086, was initially disclosed on January 31, 2024, as a use-after-free flaw in the netfilter: nf_tables kernel component. Although a fix was implemented through a commit in January 2024, the vulnerability traces back to a commit made in February 2014.

If successfully exploited, this flaw allows attackers with local access to elevate their privileges on the targeted system, potentially granting them root-level access to compromised devices.

According to experts at Immersive Labs, the consequences of exploiting this vulnerability include complete system takeover, allowing attackers to disable security measures, alter files, install malware, move laterally within the network, and steal sensitive data.

In March 2024, a security researcher known as ‘Notselwyn’ published a detailed write-up and proof-of-concept exploit targeting CVE-2024-1086 on GitHub. The exploit demonstrated how local privilege escalation could be achieved on Linux kernel versions ranging from 5.14 to 6.6.

Major Linux distributions such as Debian, Ubuntu, Fedora, and Red Hat, which utilize kernel versions between 3.15 and 6.8-rc1, are affected by this vulnerability.

Confirmation of Ransomware Exploitation

In an update released by CISA, it was revealed that the vulnerability is actively being exploited in ransomware campaigns. However, specific details about the ongoing attacks were not disclosed.

CISA included this security flaw in its Known Exploited Vulnerabilities (KEV) catalog in May 2024 and mandated federal agencies to secure their systems by June 20, 2024.

See also  Router Revolution: The WrtHug Takeover

For organizations unable to apply patches, CISA recommends implementing the following mitigations:

  1. Blocklist ‘nf_tables’ if not necessary,
  2. Restrict access to user namespaces to reduce the attack surface,
  3. Implement the Linux Kernel Runtime Guard (LKRG) module, although this may lead to system instability.

CISA emphasized the importance of addressing such vulnerabilities promptly, stating, “These types of vulnerabilities are common targets for malicious cyber actors and pose significant risks to the federal enterprise. Follow vendor instructions for mitigations or discontinue product usage if no mitigations are available.”

Picus Blue Report 2025

Recent findings show a concerning increase in password cracking incidents, with 46% of environments affected, nearly doubling from 25% in the previous year.

Access the Picus Blue Report 2025 for comprehensive insights into prevention, detection, and data exfiltration trends.

Trending