A sophisticated malware campaign targeting servers running popular web-facing services such as Apache Hadoop YARN, Docker, Confluence, and Redis has been identified.
This campaign is notable for using unique and previously unreported payloads, including four Golang binaries designed to automate the discovery and infection of vulnerable hosts.
The attackers deploy advanced techniques to exploit common misconfigurations and known vulnerabilities, such as CVE-2022-26134 in Confluence, to execute remote code and gain initial access to the servers.
Following this, they utilize shell scripts and Linux attack methodologies to deliver a cryptocurrency miner, establish a reverse shell, and ensure persistent access to the compromised systems.
The campaign was first uncovered following suspicious activity on a Docker Engine API honeypot.
Malware analysis can be fast and simple. Just let us show you the way to:
The attackers issued commands to spawn a new container using the Alpine Linux image, creating a bind mount to access the host’s root directory.
This technique is a common tactic in Docker attacks. It allows the attacker to write files directly to the host and execute remote code via Cron jobs.
Researchers from Cado Security Labs have just discovered a growing malware campaign that targets systems that have been misconfigured.
The primary payload is identified as cronb. sh, a shell script that prepares the system for further compromise by disabling security measures, deleting shell history, and installing user-mode rootkits like libprocesshider and diamorphine to hide malicious processes.
Additionally, the malware attempts to spread itself to other hosts by discovering SSH keys and executing remote commands.
The malware is particularly interested in cloud environments, with specific code designed to weaken systems and uninstall monitoring agents for Alibaba Cloud and Tencent.
This suggests a strategic focus on infiltrating and exploiting cloud-based infrastructure, a trend observed by threat actors such as WatchDog in previous campaigns.
The emergence of this campaign underscores the importance of securing web-facing services against known vulnerabilities and misconfiguration.
Organizations are advised to regularly update their software, monitor suspicious activity, and employ robust security measures to defend against such sophisticated attacks.
This new malware campaign represents a threat to servers running Apache, Docker, Redis, and Confluence, leveraging advanced techniques for exploitation, persistence, and lateral movement.
As the cyber threat landscape evolves, staying informed and vigilant is key to protecting valuable digital assets and infrastructure.
Filename | SHA256 |
cronb.sh | d4508f8e722f2f3ddd49023e7689d8c65389f65c871ef12e3a6635bbaeb7eb6e |
ar.sh | 64d8f887e33781bb814eaefa98dd64368da9a8d38bd9da4a76f04a23b6eb9de5 |
fkoths | afddbaec28b040bcbaa13decdc03c1b994d57de244befbdf2de9fe975cae50c4 |
s.sh | 251501255693122e818cadc28ced1ddb0e6bf4a720fd36dbb39bc7dedface8e5 |
bioset | 0c7579294124ddc32775d7cf6b28af21b908123e9ea6ec2d6af01a948caf8b87 |
d.sh | 0c3fe24490cc86e332095ef66fe455d17f859e070cb41cbe67d2a9efe93d7ce5 |
h.sh | d45aca9ee44e1e510e951033f7ac72c137fc90129a7d5cd383296b6bd1e3ddb5 |
w.sh | e71975a72f93b134476c8183051fee827ea509b4e888e19d551a8ced6087e15c |
c.sh | 5a816806784f9ae4cb1564a3e07e5b5ef0aa3d568bd3d2af9bc1a0937841d174 |
You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
Google has issued critical security updates to address a recently discovered zero-day vulnerability actively exploited…
WK Kellogg Co., one of the world's leading cereal and snack manufacturers, has fallen victim…
A new malicious AI tool, Xanthorox AI, has emerged on underground hacker forums. Dubbed the "Killer…
A critical vulnerability (CVE-2025-32032) has been identified in Apollo Router, a widely used GraphQL federation…
A critical vulnerability identified as CVE-2025-30401 was recently disclosed, highlighting a major security flaw in WhatsApp for…
Security researchers have uncovered a critical vulnerability (CVE-2025-3155) in Ubuntu's default help browser Yelp that…