Description |
FortiGuard Labs have observed a high level of attack activity with vulnerabilities associated with Earth Lamia APT activity.
Earth Lamia APT is a hacking group that targets a range of sectors such as finance, government, IT, logistics, retail, and education. Earth Lamia APT primarily exploits known vulnerabilities in public-facing systems and web applications to gain access.
The following software vulnerabilities have been observed in use during the Earth Lamina APT campaigns:
JetBrain TeamCity
CVE-2024-27198 is an authentication bypass vulnerability in JetBrain TeamCity which could lead to remote code execution (RCE) by an unauthorized attacker.
The following versions of JetBrain TeamCity are vulnerable to CVE-2024-27198 & CVE-2024-27199:
CyberPanel
CVE-2024-51378 & CVE-2024-51567 is an authentication bypass in CyberPanel which allowed unauthenticated attackers to execute arbitrary code.
The following versions of CyberPanel are vulnerable to CVE-2024-51378 & CVE-2024-51567:
Apache Struts Apache Struts is an open-source framework for developing Java-based web applications.
CVE-2017-9805 is a remote code execution (RCE) vulnerability in Apache Struts which allowed unauthenticated attackers to execute arbitrary code.
The following versions of Apache Struts with are vulnerable to CVE-2017-9805:
WordPress File Upload Plugin
CVE-2024-9047 is a path traversal vulnerability in the WordPress file upload plugin which allows unauthenticated attackers to read or delete files outside the intended directory.
The following versions of WordPress file upload plugin are vulnerable to CVE-2024-9047:
GitLab
CVE-2021-22205 is a remote code execution (RCE) vulnerability which allowed unauthenticated attackers to execute arbitrary code.
The following versions of GitLab are vulnerable to CVE-2021-22205:
CraftCMS
CVE-2024-56145 is a remote code execution (RCE) vulnerability which allowed unauthenticated attackers to execute arbitrary code.
The following versions of CraftCMS are vulnerable to CVE-2024-56145:
SimpleHelp
CVE-2024-57727 is a path traversal vulnerability which allowed unauthenticated attackers to download arbitrary files from the SimpleHelp host via specially crafted HTTP requests.
The following versions of SimpleHelp are vulnerable to CVE-2024-57727:
|
||||||||||||||||||||||||
CVE ID | CVE-2024-27198 (https://nvd.nist.gov/vuln/detail/CVE-2024-27198) CVE-2024-27199 (https://nvd.nist.gov/vuln/detail/CVE-2024-27199) CVE-2024-51378 (https://nvd.nist.gov/vuln/detail/CVE-2024-51378) CVE-2024-51567 (https://nvd.nist.gov/vuln/detail/CVE-2024-51567) CVE-2017-9805 (https://nvd.nist.gov/vuln/detail/CVE-2017-9805) CVE-2024-9047 (https://nvd.nist.gov/vuln/detail/CVE-2024-9047) CVE-2021-22205 (https://nvd.nist.gov/vuln/detail/CVE-2021-22205) CVE-2024-56145 (https://nvd.nist.gov/vuln/detail/CVE-2024-56145) CVE-2024-57727 (https://nvd.nist.gov/vuln/detail/CVE-2024-57727) |
||||||||||||||||||||||||
NDR Cloud Detection Rule |
FortiNDR Cloud v25.2.b+
|
||||||||||||||||||||||||
Playbook | N/A | ||||||||||||||||||||||||
Threat Hunting | FortiNDR Cloud users can use the following IOCs from Fortinet to hunt for “Earth Lamia APT Attack” related activities. IOC source: https://www.fortiguard.com/outbreak-ioc?tag=earth%20lamia%20apt%20attack All IOCs relating to "Earth Lamia APT Attack" have been added to Threat Intelligence Intel. |
||||||||||||||||||||||||
Suricata Coverage |
Customers can create custom investigation/detections using the Suricata signatures below: |
||||||||||||||||||||||||
Other Fortinet Products | For more details regarding mitigating the vulnerability by utilizing Fortinet products, please refer to: https://www.fortiguard.com/outbreak-alert/earth-lamia-apt-attack |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.