New threat actor called Rocke distributing and executing crypto-mining malware using variously sophisticated toolkit and Git repositories to mine Monero cryptocurrency.
Malicious cryptocurrency miners are significantly increasing day by day in various form to generate revenue by various cyber criminals group and individuals.
In this case, an attacker using various distribution method including HttpFileServers (HFS), and a myriad of different payloads, including shell scripts, JavaScript backdoors, as well as ELF and PE miners.
The initial stage of this campaign started in April 2018 when it leverages Chinese Git repositories to drop the malware to honeypot systems that were vulnerable to Apache Struts vulnerability.
Researcher learned that there are 2 Chinese repositories Gitee and GitLab is ultimately responsible for executing the cryptocurrency miner.
Also, the repository contains a collection of ELF executables, shell scripts, and text files with a lot more persistence mechanism.
This attack could be initiated by the same gang or individual cyber criminals who were exploiting an Oracle WebLogic server vulnerability (CVE-2017-10271) which is Java deserialization vulnerability in the Adobe ColdFusion platform.
Apart from this attackers keep expanding the toolset that contains browser-based miners, difficult-to-detect trojans, and the Cobalt Strike malware to compromise the various platform victims.
The researcher observed a Struts2 honeypot system that contains a file named “0720.bin” which is located in 118[.]24[.]150[.]172:10555.
Once they visited the IP address that contains aditional 10 files “3307.bin,” “a7,” “bashf,” “bashg,” “config.json,” “lowerv2.sh,” “pools.txt,” “r88.sh,” “rootv2.sh” and “TermsHost.exe.”
One of the files called “A7” is a shell script that helps an attacker to kill the various running process on the victim’s machine and other crypto mining malware, uninstall various Chinese antivirus.
According to Cisco Talos, A file called “Config.json” is a mining config file for XMRig, an open-source Monero miner. The file sets the mining pool as xmr[.]pool[.]MinerGate[.]com:45700 and the actor’s wallet as rocke@live.cn. This is why we have named the actor “Rocke”
Another file called “TermsHost.exe” is later in this campaign which is PE32 Monero miner also it called as Monero Silent Miner.
Also, this miner can be purchased online for $14 and targets malicious actors and cybercriminals advertising for the miner promotes it as offering startup registry key persistence, mining only while idle, and the ability to inject the miner into “Windows processes to bypass firewalls.” Talos said.
Attackers infecting new victims via social engineering that involved with fake Adobe Flash and Google Chrome updates.
Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet
A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers to…
The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 - Core Update…
A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely harvest…
The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important milestone…
Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling authenticated…
Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…