A threat intelligence report published on February 25, 2026, details a multi-stage intrusion that culminated in the deployment of LockBit ransomware. The incident highlights threat actor persistence and the importance of thorough incident response. The attackers' initial entry point was the exploitation of CVE-2023-46604, a critical remote code execution (RCE) vulnerability in Apache ActiveMQ. Despite being detected and removed from the network, the attackers successfully re-entered the environment 18 days later by using credentials they had exfiltrated during their initial access. Leveraging tools like Metasploit and AnyDesk, the threat actors achieved their objective, underscoring that simply patching a vulnerability without addressing potential footholds like stolen credentials is insufficient remediation.
The attack was carried out by an affiliate of the LockBit ransomware-as-a-service (RaaS) operation. The incident demonstrates a common but effective attack chain: exploit a public-facing vulnerability for initial access, steal credentials for persistent and stealthy access, and then use legitimate remote access tools to deploy the final payload. The 18-day gap between eviction and re-entry shows a patient and determined adversary, willing to wait for an opportunity to reuse their stolen access.
T1190 - Exploit Public-Facing Application): The attackers scanned for and exploited a vulnerable Apache ActiveMQ server using CVE-2023-46604. This gave them an initial shell on the compromised server.T1003 - OS Credential Dumping): During this initial, short-lived access, the attackers likely used a credential dumping tool to exfiltrate account credentials from the server before being detected and evicted.T1078 - Valid Accounts): Eighteen days later, the attackers used the previously stolen credentials to log in via Remote Desktop Protocol (RDP) (T1021.001 - Remote Services: Remote Desktop Protocol). This allowed them to bypass perimeter defenses stealthily.T1486 - Data Encrypted for Impact): With broad access across the network, the attackers deployed the LockBit ransomware payload, encrypting files and completing their mission.The successful deployment of ransomware leads to significant business disruption, financial loss from downtime, and potentially the cost of the ransom itself. This incident highlights a critical failure in the initial incident response process. By not identifying and changing the compromised credentials, the organization left a wide-open door for the attackers to return. The lesson is that remediation must be comprehensive: it's not enough to patch the entry point; all potential persistence mechanisms and footholds established by the attacker must also be eliminated.
D3-UGLPA - User Geolocation Logon Pattern Analysis.certutil.exe. For example, certutil.exe -urlcache -split -f <URL> making a connection to an external site is a strong indicator of malicious activity.D3-ANCI - Authentication Cache Invalidation.After an intrusion, it is critical to reset all potentially compromised credentials to prevent attacker re-entry.
Timely patching of critical vulnerabilities like CVE-2023-46604 is essential to block the initial attack vector.
Enforce MFA on all remote access solutions like RDP and VPNs to protect against the use of stolen credentials.
Use application allowlisting to prevent unauthorized remote access tools like AnyDesk from running.
The critical failure in this incident was allowing the attacker to return with stolen credentials. The most important lesson and countermeasure is comprehensive credential invalidation as part of any incident response process. After evicting an attacker who had access to a server, the organization must assume all credentials on that server were compromised. This requires a mandatory, network-wide password reset for all user and service accounts. Forcing a password change invalidates the credentials stolen by the LockBit actor, making their primary re-entry vector (RDP with valid accounts) useless. This single step would have prevented the final ransomware deployment.
The entire attack chain began with the exploitation of a known vulnerability, CVE-2023-46604. A proactive software update and patch management program would have prevented the incident entirely. Organizations must have an accurate asset inventory to know they are running Apache ActiveMQ and a process to monitor for and apply critical security patches in a timely manner. For a known RCE vulnerability that is actively exploited by ransomware groups, the patch should be applied on an emergency basis. This preventative control is far more effective and less costly than responding to a breach after it has occurred.
To prevent the attackers from establishing persistent control after re-entry, organizations should use application control or executable denylisting. The security team should maintain a list of unauthorized software, which must include legitimate-but-risky remote access tools like AnyDesk, TeamViewer, etc. An EDR or application control solution can then be configured to block the execution of any application on this denylist. This would have prevented the LockBit actors from installing AnyDesk, disrupting their ability to maintain interactive access and making it harder for them to navigate the network and deploy the final ransomware payload.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats