The recently disclosed critical security flaw impacting Apache ActiveMQ is being actively exploited by threat actors to distribute a new Go-based botnet called GoTitan as well as a .NET program known as PrCtrl Rat that's capable of remotely commandeering the infected hosts.
- Threat actors are exploiting a critical security flaw in Apache ActiveMQ to distribute the GoTitan botnet and PrCtrl Rat malware.
- The attacks involve the exploitation of a remote code execution bug (CVE-2023-46604) that has been weaponized by various hacking groups.
- GoTitan is a botnet designed for orchestrating DDoS attacks via protocols such as HTTP, UDP, TCP, and TLS.
- PrCtrl Rat is a remote access trojan that establishes contact with a command-and-control server to receive additional commands for execution on the infected system.
- The motive behind disseminating PrCtrl Rat remains unclear, but once it infiltrates a user's environment, the remote server gains control over the system.