Sunday, April 20, 2025
HomeTorjan Horses/wormsSambaCry Vulnerability used by Hackers to attack Linux Servers and Mine's Cryptocurrency

SambaCry Vulnerability used by Hackers to attack Linux Servers and Mine’s Cryptocurrency

Published on

SIEM as a Service

Follow Us on Google News

Linux Machine’s are Hijacked by unknown Vulnerability by using SambaCry Flow and it has cryptocurrency mining utility. This Vulnerability Exploit by using unauthorized Write Permission in Network Drive in Linux Machines.

The Legitimate Text File writes by the attacker which Consists of 8 Random symbols in Samba.Suddenly attacker deletes the file Once Attempt has been successfully done.

Super Privilege Access has been successfully takeover by this Sambacry Payload once payload has injected into the Linux Server.

- Advertisement - Google News

Also Read Linux malware that Targets Raspberry Pi for Mining Cryptocurrency

According to Kaspersky Lab, although first, the attackers have to guess the full path to the dropped file with their payload, starting from the root directory of the drive.

By using Honeypot, Researchers Trace the payload Activities by Capture the  Traffic and they Find where files can be stored on the drive.

SambaCry Vulnerability used by Hackers to Mine Cryptocurrency

Cryptocurrency mining operation:

Researchers said, “The main functionality of this file is to download and execute one of the most popular open-source cryptocurrency mining utilities – cpuminer (miderd). It is done by the hard coded shell-command “

Interesting  Fact of this version of cpuminer used is “upgraded”. so it can perform Directly Mine the currency without launched any parameters to the hard-coded attackers’ wallet.

“Along with the attackers’ wallet number, the pool address (xmr.crypto-pool.fr:3333) can be found in the body of the miner. This pool is created for mining the open-source cryptocurrency – monero. Using all this data we managed to check out the balance on the attackers’ wallet and the full log of transactions”

SambaCry Vulnerability used by Hackers to Mine Cryptocurrency

Log of transactions with all the attackers’ cryptocurrency income Credits:SECURELIST

According to the Report, During the first day they gained about 1 XMR (about $55 according to the currency exchange rate for 08.06.2017), but during the last week they gained about 5 XMR per day

This means that the botnet of devices working for the profit of the attackers is growing.

To mining cryptocurrency for the attackers attacked machine turns into a workhorse on a large list and also the attackers can change the configuration of a miner already running or infect the victim’s computer with other types of malware.Researchers said.

Also Read A multi-component Trojan from Linux.LuaBot family infecting Linux devices

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations....

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run...

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus,...

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

MnuBot – New Banking Trojan Take Browsers Screenshots, Keylogging to Steal Bank Data

Newly discovered banking Trojan named MnuBot malware spreading to steal the sensitive bank related...

New Banking Trojan IcedID Evade Sandboxes and Performing Web Injection Attacks

A New Banking Trojan dubbed IcedID discovered that capable of performing some dangerous web-based...

Silence Trojan Targeting Financial Institutions Recording day to day activity on Bank Employees’ PCs

Security experts from Kaspersky lab discovered a new trojan dubbed Silence trojan that targeting Financial...