Thursday, April 24, 2025
Homecyber securityHackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Published on

SIEM as a Service

Follow Us on Google News

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both Windows and Linux systems.

The attack utilizes multiple stages of obfuscation, including encrypted payloads and COM object manipulation, to ultimately deploy miners for various cryptocurrencies including Monero, Ravencoin, and several others.

This previously unreported exploitation method demonstrates how threat actors continue to evolve their tactics to monetize vulnerable cloud infrastructure, potentially causing degraded system performance, increased operational costs, and security risks for affected organizations.

- Advertisement - Google News

Sophisticated Multi-Stage Attack Methodology

The attack begins when threat actors access misconfigured Jupyter Notebooks, interactive Python development environments commonly used by data scientists.

Upon gaining access, the attackers attempt to retrieve and execute a bash script and Microsoft Installer (MSI) file.

On Windows systems, the MSI file executes a 64-bit executable named “Binary.freedllbinary,” which serves as the initial loader.

This loader creates a secondary payload called “java.exe” stored in the C:\ProgramData directory, using Component Object Model (COM) objects to facilitate the operation.

Despite its name suggesting legitimate Java software, this executable is actually malware packed with UPX to evade detection.

The Windows payload retrieves an encrypted blob named “x2.dat” from various repositories including GitHub, Launchpad, or Gitee (a Chinese GitHub alternative).

This data is encrypted using the ChaCha20 algorithm with specific nonce and key values, then compressed with zlib.

ChaCha routine
Reading the written lx.dat file

After decryption and decompression, the resulting binary reveals its true purpose: a cryptominer targeting multiple cryptocurrencies including Monero, Sumokoin, ArQma, Graft, Ravencoin, Wownero, Zephyr, Townforge, and YadaCoin.

The threat actors implemented this multi-layered approach specifically to bypass security controls and maintain persistence on compromised systems.

Cross-Platform Capabilities and Infrastructure

The campaign demonstrates sophisticated cross-platform capabilities, with distinct attack vectors for Linux environments.

If the initial MSI execution fails, the attackers attempt to retrieve and run “0217.js,” a bash backdoor that downloads two ELF binaries—”0218.elf” and “0218.full”—from a remote server.

The script renames these files using timestamp-based naming conventions, places them in system directories like /etc/, /tmp/, or /var/tmp/, and establishes persistence through crontab entries scheduled to execute every 10 to 40 minutes.

This ensures the malware remains active even after system restarts or initial removal attempts.

Similar to its Windows counterpart, the Linux version of the malware (“0218.elf”) searches for a lock file named “cpudcmcb.lock” across various system paths to prevent concurrent execution of multiple instances.

It then retrieves an encrypted payload “lx.dat” from several potential sources, decrypts it using ChaCha20 with a specific nonce and key, and decompresses it with zlib.

The final payload is another ELF binary that functions as a cryptominer targeting the same cryptocurrencies as the Windows variant.

Interestingly, researchers noted that “0218.full” appears to be identical to the final cryptominer payload, though the reasons for deploying two versions of the same mining software remain unclear.

Both variants connect to mining pools including C3.wptask.cyou, Sky.wptask.cyou, and auto.skypool.xyz, with transactions linked to a specific wallet ID.

Connections to Other Campaigns and Security Recommendations

During their investigation, Cado Security Labs uncovered a parallel campaign targeting PHP servers using the same infrastructure.

This campaign utilizes a PHP script (“1.php”) hosted on the same remote server that checks whether the target is running Windows or Linux, then downloads the appropriate binary—”php0218.exe” for Windows or “php0218.elf” for Linux.

Analysis confirmed that these are identical to the binaries used in the Jupyter Notebook campaign, indicating a broader operation by the same threat actors.

The researchers also noted similarities to previous campaigns, including a January 2024 attack against Ivanti Connect Secure and a June 2024 campaign targeting unpatched Korean web servers, both using similar tactics, techniques, and procedures (TTPs).

Mining pool 45[.]147[.]51[.]78

Security experts emphasize that exposed cloud services continue to be prime targets for cryptominers and other malicious actors.

The sophisticated nature of this campaign—with its multi-stage execution, cross-platform capability, and obfuscation techniques—highlights the evolving threat landscape.

To mitigate these risks, organizations should implement strong authentication mechanisms for all cloud services, disable public access to development environments like Jupyter Notebooks, and regularly monitor system performance and network connections for unusual activity.

Additional protective measures include implementing strict network restrictions, configuring auto-shutdown policies for idle instances, and utilizing cloud provider security tools to detect unauthorized access attempts.

The discovery of this cryptomining campaign targeting Jupyter Notebooks reveals how threat actors continue to innovate in their approaches to compromising cloud resources for financial gain.

By exploiting misconfigured services and implementing sophisticated multi-stage attacks with cross-platform capabilities, these operations can remain undetected while consuming computational resources and potentially creating security vulnerabilities.

Organizations must maintain continuous vigilance through regular security audits, employ proactive security measures including proper configuration management, and educate users about the importance of securing development environments.

As cloud adoption continues to accelerate, understanding and addressing these emerging threats becomes increasingly critical for maintaining operational security and performance across digital infrastructure.

Are you from SOC/DFIR Teams?: Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...