Monday, February 17, 2025
HomeMalwareCapoae Malware Attacking Linux systems & Web Apps Using Multiple Vulnerabilities

Capoae Malware Attacking Linux systems & Web Apps Using Multiple Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

A senior security researcher Larry Cashdollar, has detected malware that is dubbed Capoae on Thursday, and this malware by exploiting the multiple vulnerabilities is attacking the Linux systems and several web applications. 

The Capoae malware was actually written in the Golang programming language, and it has soon become the firm favorite since it has cross-platform capabilities.

Moreover, it also spreads through identified bugs and weak official credentials. However, the vulnerabilities that were exploited by Capoae append:- 

The main motive of the malware is to grow by taking advantage of vulnerable systems and weak administrative credentials as we hinted above. 

Apart from spreading crypto-mining malware attacks, the cyber security analysts also found that the SIRT honeypots were also affected by PHP malware that appeared through a backdoored which is an extension to a WordPress plugin called “Download-monitor.”

Now to deploy the main Capoae payload to /tmp this plugin was used as a channel, and once done, then a 3MB UPX packed binary was decoded. And all these steps were executed to install XMRig to mine Monero (XMR) cryptocurrency.

What is in the binary?

After detecting the malware, cybersecurity authorities initiated a strong investigation to know all the details about these vulnerabilities. And to do so, they unpacked the malware along with ‘upx -d’, to have a proper look at the actual binary structure. 

Here the researchers declared that they have found many key details regarding the vulnerabilities, and they noticed that the main structure reveals that it has functions that are targeting a handful of well-known vulnerabilities and has content management frameworks. 

The Golang malware can be found in VirusTotal with an origin date of 8/9/2021:-

$ ./redress -compiler Capoae 

Compiler version: go1.15.4 (2020-11-05T21:21:32Z)

However, this Capoae campaign’s use of several vulnerabilities and different methods during the attack highlights that how intent these threat actors are on getting a foothold on as many machines as they can.

Recommendations

The most important point is that the techniques that were used by the threat actors, were the same methods that are recommended for most companies to keep their systems and networks secure. 

But, one can understand if they got attacked or not by seeing:- 

  • High system resource use
  • Accidental or unrecognizable system processes in administration
  • Unfamiliar log entries or artifacts

This type of campaign is quite dangerous for the organization, that’s why every user must have a brief knowledge regarding this kind of attack, and how they will overcome it efficiently.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Lazarus Group Targets Developers Worldwide with New Malware Tactic

North Korea's Lazarus Group, a state-sponsored cybercriminal organization, has launched a sophisticated global campaign...