Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»CISA Reveals Federal Agency Was Compromised Via GeoServer Exploit
News

CISA Reveals Federal Agency Was Compromised Via GeoServer Exploit

Team-CWDBy Team-CWDSeptember 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A federal agency was compromised last year after failures in vulnerability remediation, incident response and EDR log reviews, according to the US Cybersecurity and Infrastructure Security Agency (CISA).

CISA claimed in a “lessons learned” advisory published on September 23 that threat actors gained access to the agency’s network on July 11, 2024, by exploiting CVE 2024-36401 on a public-facing GeoServer.

That critical remote code execution (RCE) bug was added to the CISA Known Exploited Vulnerabilities (KEV) catalog on July 15.

The adversaries used the vulnerability to download open source tools and scripts and establish persistence in the agency’s network, before exploiting the same flaw to access a second GeoServer over a week later.

“They moved laterally from GeoServer 1 to a web server and then a Structured Query Language (SQL) server,” CISA explained.

“On each server, they uploaded (or attempted to upload) web shells such as China Chopper, along with scripts designed for remote access, persistence, command execution, and privilege escalation. The cyber-threat actors also used living off the land (LOTL) techniques.”

Read more on US government breaches: CISA Claims Treasury Breach Did Not Impact Other Agencies.

The adversaries relied mainly on brute-force techniques to obtain passwords for lateral movement and privilege escalation, and also accessed service accounts by exploiting their associated services, the report added.

Lessons Learned

CISA claimed the federal agency failed on several counts:

  • It didn’t remediate the GeoServer vulnerability quickly enough. Although it wasn’t added to KEV until four days after the initial compromise, the CVE was patched by the vendor 11 days previously, on June 30. Exploitation of the second server occurred on July 24, which was within the KEV patching window
  • The agency didn’t test its incident response plan, and the plan itself didn’t enable it to engage or allow third parties to access resources swiftly. This hampered CISA’s own response efforts
  • EDR alerts weren’t continuously reviewed, meaning the malicious activity went undetected for three weeks. An alert on July 15 would have enabled swift containment of the threat
  • The agency didn’t apply EDR to all endpoints. Its web server lacked protection, for example

“CISA encourages all organizations to consider the lessons learned and apply the associated recommendations in the Mitigations section of this advisory to improve their security posture,” the agency said.

Exabeam security operations strategist, Gabrielle Hempel, argued the incident highlights that patching processes are still sub-optimal across government agencies.

“I know we keep saying ‘expedite patching,’ but the real need is automated enforcement,” she added. “If a critical CVE is in KEV, patch it, or pull the system off the network. Leaving these exposed should no longer be an acceptable risk posture in any organization, especially in a federal landscape.”

CISA did not name the federal civilian executive branch agency that was impacted by the compromise. 



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns
Next Article Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

Chronology of a Skype attack

February 5, 2026

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.