Cyber Security News

Hackers Exploited Palo Alto’s Firewall Vulnerability to Deploy RA World Ransomware

In a significant cybersecurity breach, attackers exploited a critical vulnerability in Palo Alto Networks’ PAN-OS firewall software (CVE-2024-0012) to deploy the RA World ransomware. 

The attack, which occurred in late 2024, targeted a medium-sized software and services company in South Asia, marking a rare convergence of espionage tools and ransomware tactics.

The vulnerability, CVE-2024-0012, is an authentication bypass flaw in PAN-OS that allows unauthenticated attackers to gain administrative access to the firewall’s management web interface. 

With 9.3 on the CVSS scale, it enables attackers to execute arbitrary commands with root privileges if exploited. Palo Alto Networks disclosed this flaw in November 2024 and urged organizations to patch their systems immediately.

Attack Details

The attackers reportedly leveraged this vulnerability to gain access to the target’s network. Once inside, they obtained administrative credentials from the intranet and stole Amazon S3 cloud credentials from a Veeam server. 

Using these credentials, they exfiltrated data from S3 buckets before encrypting systems with RA World ransomware. The attackers demanded a $2 million ransom, offering a reduced payment of $1 million for compliance within three days.

Espionage Tools in Ransomware Deployment

Symantec researchers stated that this attack stands out since it makes use of tools usually found in espionage organizations with ties to China

The attackers deployed a malicious DLL named toshdpapi.dll via sideloading using a legitimate Toshiba executable (toshdpdb.exe). 

This DLL decrypted and executed a heavily obfuscated payload stored in toshdp.dat. The payload was identified as a variant of PlugX (Korplug), a custom backdoor exclusively linked to China-based espionage actors such as Fireant (aka Mustang Panda).

This PlugX variant featured advanced techniques like encrypted strings, dynamic API resolution, and control flow flattening. 

Its configuration was encrypted using RC4 keys (qwedfgx202211), aligning it with previously documented espionage campaigns targeting government entities in Europe and Southeast Asia throughout 2024 and early 2025.

Broader Implications

The incident highlights an emerging trend where state-linked cyber actors deploy ransomware either for financial gain or as part of hybrid operations blending espionage and cybercrime. 

Historically, Chinese cyberespionage groups have avoided ransomware; however, reports indicate increasing adoption of such tactics to obscure attribution or generate revenue. 

This shift mirrors strategies employed by North Korean threat actors but is unprecedented for China-based groups.

Mitigation Measures

  • Organizations using Palo Alto Networks firewalls are urged to:
  • Apply updates addressing CVE-2024-0012 and related vulnerabilities immediately.
  • Configure access controls to limit management interface exposure to trusted internal IPs.
  • Use threat detection tools to identify suspicious patterns indicative of exploitation attempts.

Palo Alto Networks has provided updated firmware versions and Threat Prevention signatures to mitigate these vulnerabilities effectively. 

Cybersecurity teams must remain vigilant against increasingly sophisticated hybrid threats blending state-sponsored tactics with criminal objectives.

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer

A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows…

1 hour ago

AWS SNS Abused To Exfiltrate Data & Phishing Attack

Amazon Web Services Simple Notification Service (AWS SNS) has emerged as a new vector for…

2 hours ago

DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware

Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated…

2 hours ago

Top Cybersecurity Tools of 2025 To Managing Remote Device Threats

The rise of remote work has significantly increased the attack surface for cybercriminals, making robust…

6 hours ago

New Context Compliance Attack Jailbreaks Most of The Major AI Models

A new, surprisingly simple method called Context Compliance Attack (CCA) has proven effective at bypassing…

23 hours ago

Black Basta Ransomware Attack Edge Network Devices With Automated Brute Force Attacks

A Russian-speaking actor using the Telegram handle @ExploitWhispers leaked internal chat logs of Black Basta…

1 day ago