Wednesday, December 11, 2024
HomeCyber Security NewsNew Linux Malware Attacking Apache, Docker, Redis & Confluence Servers

New Linux Malware Attacking Apache, Docker, Redis & Confluence Servers

Published on

SIEM as a Service

A sophisticated malware campaign targeting servers running popular web-facing services such as Apache Hadoop YARN, Docker, Confluence, and Redis has been identified.

This campaign is notable for using unique and previously unreported payloads, including four Golang binaries designed to automate the discovery and infection of vulnerable hosts.

The attackers deploy advanced techniques to exploit common misconfigurations and known vulnerabilities, such as CVE-2022-26134 in Confluence, to execute remote code and gain initial access to the servers.

- Advertisement - SIEM as a Service

Following this, they utilize shell scripts and Linux attack methodologies to deliver a cryptocurrency miner, establish a reverse shell, and ensure persistent access to the compromised systems.

Initial Access and Exploitation

The campaign was first uncovered following suspicious activity on a Docker Engine API honeypot.

Document
Integrate ANY.RUN in your company for Effective Malware Analysis

Are you from SOC and DFIR teams? – Join With 400,000 independent Researchers

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..


The attackers issued commands to spawn a new container using the Alpine Linux image, creating a bind mount to access the host’s root directory.

This technique is a common tactic in Docker attacks. It allows the attacker to write files directly to the host and execute remote code via Cron jobs.

Wireshark output demonstrating Docker communication, including Initial Access commands
Wireshark output demonstrating Docker communication, including Initial Access commands

Researchers from Cado Security Labs have just discovered a growing malware campaign that targets systems that have been misconfigured.

Payload Delivery and Persistence

The primary payload is identified as cronb. sh, a shell script that prepares the system for further compromise by disabling security measures, deleting shell history, and installing user-mode rootkits like libprocesshider and diamorphine to hide malicious processes.

Additionally, the malware attempts to spread itself to other hosts by discovering SSH keys and executing remote commands.

The malware is particularly interested in cloud environments, with specific code designed to weaken systems and uninstall monitoring agents for Alibaba Cloud and Tencent.

This suggests a strategic focus on infiltrating and exploiting cloud-based infrastructure, a trend observed by threat actors such as WatchDog in previous campaigns.

Defense and Mitigation

The emergence of this campaign underscores the importance of securing web-facing services against known vulnerabilities and misconfiguration.

Organizations are advised to regularly update their software, monitor suspicious activity, and employ robust security measures to defend against such sophisticated attacks.

This new malware campaign represents a threat to servers running Apache, Docker, Redis, and Confluence, leveraging advanced techniques for exploitation, persistence, and lateral movement.

As the cyber threat landscape evolves, staying informed and vigilant is key to protecting valuable digital assets and infrastructure.

IOCs

FilenameSHA256
cronb.shd4508f8e722f2f3ddd49023e7689d8c65389f65c871ef12e3a6635bbaeb7eb6e
ar.sh64d8f887e33781bb814eaefa98dd64368da9a8d38bd9da4a76f04a23b6eb9de5
fkothsafddbaec28b040bcbaa13decdc03c1b994d57de244befbdf2de9fe975cae50c4
s.sh251501255693122e818cadc28ced1ddb0e6bf4a720fd36dbb39bc7dedface8e5
bioset0c7579294124ddc32775d7cf6b28af21b908123e9ea6ec2d6af01a948caf8b87
d.sh0c3fe24490cc86e332095ef66fe455d17f859e070cb41cbe67d2a9efe93d7ce5
h.shd45aca9ee44e1e510e951033f7ac72c137fc90129a7d5cd383296b6bd1e3ddb5
w.she71975a72f93b134476c8183051fee827ea509b4e888e19d551a8ced6087e15c
c.sh5a816806784f9ae4cb1564a3e07e5b5ef0aa3d568bd3d2af9bc1a0937841d174

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center...

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...