Description

Security researchers have uncovered a large-scale cyber campaign involving a Linux-based toolkit known as RingH23, which is being used to compromise websites running the MacCMS platform along with parts of CDN infrastructure. The activity is linked to the cybercrime group Funnull, known for operating large-scale traffic manipulation and fraud networks. By compromising infrastructure components and injecting malicious scripts, attackers can redirect legitimate website visitors to scam, gambling, or adult platforms, enabling large-scale monetization of hijacked traffic. The campaign operates through two primary infection vectors. In the first method, attackers compromise GoEdge CDN management nodes, where they deploy an infection module called infectinit with root privileges. This module extracts edge-node credentials from the CDN database and automatically spreads to multiple CDN edge servers using SSH. Once deployed, the RingH23 toolkit installs several malicious components including a persistent backdoor, a malicious Nginx filter capable of injecting JavaScript into web traffic, and a stealth rootkit that hides malicious processes by manipulating system libraries through /etc/ld.so.preload. These components allow attackers to modify website responses, inject scripts, hijack downloads, or even replace cryptocurrency wallet addresses during transactions. The second attack vector abuses the update mechanism of MacCMS. When administrators log in for the first time, the CMS contacts its update server to download additional components. Threat actors exploit this mechanism to deliver malicious ZIP packages containing PHP backdoors that automatically modify website templates and inject JavaScript into pages served to visitors. The payload often uses short-lived download links and aggressive caching headers, making forensic analysis more difficult and allowing the malicious activity to persist across multiple sites without immediate detection.