Posted on Leave a comment

Five Different Malware Families Targeting Pulse Secure Devices.

Cybersecurity and Infrastructure Security Agency has released a detailed five malware report targeting Pulse Secure Devices . CISA has also released Malware analysis reports(MARs) containing threat actor tactics, techniques and procedures along with indicators of compromise related to the threat activity.

According to the reports published, threat actors seems to be exploiting multiple vulnerabilities inclusive of CVE-2021-22893 and CVE-2021-22937. On which, CVE-2021-22893 is a buffer overflow issue which allows arbitrary code execution by the authenticated attacker with maliciously crafted payload with the CVSS score of 10.

On the other hand, CVE-2021-22937 could allow an authenticated administrator to perform a file write via maliciously crafted archive uploaded  in the administrator web interface. The vulnerability also received a CVSS score of 9.1 for which the vendor has addressed it via the updates.

“Some of the files consist of shell scripts designed to modify a Pulse Secure Perl Common Gateway Interface (CGI) script file in place to become a webshell. One file is designed to intercept certificate-based multi-factor authentication. The other files are designed to check, parse and decrypt incoming web request data. This analysis is derived from malicious files found on Pulse Connect Secure devices.” reads the blogpost.

CISA has released the detailed recommendations which should be followed by the users and administrator:

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Submitted files List:

49a243e7a7cccf0f4242a00827ff2da27ca0e268f2673b3f3569ec92745ca0c5 (

4e231b1525c4af04e8bf5dfc7de34a28f3441bc339130bf2a683e42b39953be2 (compcheckjs1.cgi)

6d96963c87a6682b7b3a050d7a4a4a827e1a0e115f83b550b7b424a0f6a7f392 (compcheckjs.cgi)

e21531553ea596fb3f0f926c0bdd31f93675ab767a1fc0d662f10a29cc6809c6 (

CISA has also released the Indicators of Compromise for the reported vulnerability in Stix Format.

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin.

Leave a Reply