LockBit Attackers Exploit Apache ActiveMQ Flaw, Return After Eviction

LockBit Ransomware Deployed via Apache ActiveMQ Flaw (CVE-2023-46604) in Persistent Attack

HIGH
February 25, 2026
5m read
RansomwareVulnerabilityCyberattack

Related Entities

Products & Tech

Apache ActiveMQMetasploit AnyDeskRemote Desktop Protocol

Other

CVE Identifiers

CVE-2023-46604
CRITICAL

Full Report

Executive Summary

A threat intelligence report published on February 25, 2026, details a multi-stage intrusion that culminated in the deployment of LockBit ransomware. The incident highlights threat actor persistence and the importance of thorough incident response. The attackers' initial entry point was the exploitation of CVE-2023-46604, a critical remote code execution (RCE) vulnerability in Apache ActiveMQ. Despite being detected and removed from the network, the attackers successfully re-entered the environment 18 days later by using credentials they had exfiltrated during their initial access. Leveraging tools like Metasploit and AnyDesk, the threat actors achieved their objective, underscoring that simply patching a vulnerability without addressing potential footholds like stolen credentials is insufficient remediation.

Threat Overview

The attack was carried out by an affiliate of the LockBit ransomware-as-a-service (RaaS) operation. The incident demonstrates a common but effective attack chain: exploit a public-facing vulnerability for initial access, steal credentials for persistent and stealthy access, and then use legitimate remote access tools to deploy the final payload. The 18-day gap between eviction and re-entry shows a patient and determined adversary, willing to wait for an opportunity to reuse their stolen access.

Technical Analysis

Stage 1: Initial Compromise

  1. Initial Access (T1190 - Exploit Public-Facing Application): The attackers scanned for and exploited a vulnerable Apache ActiveMQ server using CVE-2023-46604. This gave them an initial shell on the compromised server.
  2. Credential Access (T1003 - OS Credential Dumping): During this initial, short-lived access, the attackers likely used a credential dumping tool to exfiltrate account credentials from the server before being detected and evicted.

Stage 2: Re-entry and Ransomware Deployment

  1. Valid Accounts (T1078 - Valid Accounts): Eighteen days later, the attackers used the previously stolen credentials to log in via Remote Desktop Protocol (RDP) (T1021.001 - Remote Services: Remote Desktop Protocol). This allowed them to bypass perimeter defenses stealthily.
  2. Execution and Lateral Movement: Once inside, the attackers used a toolkit to expand their control:
    • Metasploit: Used for further exploitation and privilege escalation within the network.
    • AnyDesk: A legitimate remote access tool, was installed to provide persistent, interactive access to compromised systems.
    • CertUtil: The legitimate Windows utility was likely abused to download additional tools or payloads from the internet, a common living-off-the-land (LotL) technique.
  3. Impact (T1486 - Data Encrypted for Impact): With broad access across the network, the attackers deployed the LockBit ransomware payload, encrypting files and completing their mission.

Impact Assessment

The successful deployment of ransomware leads to significant business disruption, financial loss from downtime, and potentially the cost of the ransom itself. This incident highlights a critical failure in the initial incident response process. By not identifying and changing the compromised credentials, the organization left a wide-open door for the attackers to return. The lesson is that remediation must be comprehensive: it's not enough to patch the entry point; all potential persistence mechanisms and footholds established by the attacker must also be eliminated.

Detection & Response

  1. Monitor RDP Logins: Closely monitor RDP authentication logs. Alert on logins from unusual IP addresses, at odd hours, or with accounts that do not typically use RDP. This is part of D3FEND's D3-UGLPA - User Geolocation Logon Pattern Analysis.
  2. Detect Remote Access Tools: Use EDR or application control to detect and block the installation and execution of unauthorized remote access software like AnyDesk.
  3. LotL Abuse Detection: Monitor for abuse of legitimate Windows utilities like certutil.exe. For example, certutil.exe -urlcache -split -f <URL> making a connection to an external site is a strong indicator of malicious activity.

Mitigation

  1. Comprehensive Incident Remediation: After any security incident, a full remediation plan must include not only patching the initial vulnerability but also a network-wide password reset for all potentially compromised accounts (especially privileged ones). This is a critical part of D3FEND's D3-ANCI - Authentication Cache Invalidation.
  2. Patch Management: Proactively patch known vulnerabilities, especially critical RCEs like CVE-2023-46604, to prevent initial access in the first place.
  3. Restrict RDP: Limit RDP access from the internet. If it's required, it must be placed behind a VPN and protected with Multi-Factor Authentication (MFA).
  4. Application Allowlisting: Implement application allowlisting to prevent unauthorized software like AnyDesk or tools dropped by Metasploit from running on endpoints and servers.

Timeline of Events

1
February 25, 2026
This article was published

MITRE ATT&CK Mitigations

After an intrusion, it is critical to reset all potentially compromised credentials to prevent attacker re-entry.

Timely patching of critical vulnerabilities like CVE-2023-46604 is essential to block the initial attack vector.

Enforce MFA on all remote access solutions like RDP and VPNs to protect against the use of stolen credentials.

Use application allowlisting to prevent unauthorized remote access tools like AnyDesk from running.

D3FEND Defensive Countermeasures

The critical failure in this incident was allowing the attacker to return with stolen credentials. The most important lesson and countermeasure is comprehensive credential invalidation as part of any incident response process. After evicting an attacker who had access to a server, the organization must assume all credentials on that server were compromised. This requires a mandatory, network-wide password reset for all user and service accounts. Forcing a password change invalidates the credentials stolen by the LockBit actor, making their primary re-entry vector (RDP with valid accounts) useless. This single step would have prevented the final ransomware deployment.

The entire attack chain began with the exploitation of a known vulnerability, CVE-2023-46604. A proactive software update and patch management program would have prevented the incident entirely. Organizations must have an accurate asset inventory to know they are running Apache ActiveMQ and a process to monitor for and apply critical security patches in a timely manner. For a known RCE vulnerability that is actively exploited by ransomware groups, the patch should be applied on an emergency basis. This preventative control is far more effective and less costly than responding to a breach after it has occurred.

To prevent the attackers from establishing persistent control after re-entry, organizations should use application control or executable denylisting. The security team should maintain a list of unauthorized software, which must include legitimate-but-risky remote access tools like AnyDesk, TeamViewer, etc. An EDR or application control solution can then be configured to block the execution of any application on this denylist. This would have prevented the LockBit actors from installing AnyDesk, disrupting their ability to maintain interactive access and making it harder for them to navigate the network and deploy the final ransomware payload.

Sources & References

Cyware Daily Threat Intelligence, February 25, 2026
Cyware (cyware.com) February 25, 2026
February 2026 Cyber Threat Intelligence Roundup
Cynet (cynet.com) February 25, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

LockBitRansomwareApache ActiveMQCVE-2023-46604PersistenceIncident ResponseRDP

📢 Share This Article

Help others stay informed about cybersecurity threats