A fresh massive cryptomining campaign target Linux servers exploiting old flaw

Read, think, share … Security is everyone’s responsibility

Trend Micro uncovered a fresh crypto mining campaign targeting Linux servers that exploit the CVE-2013-2618 flaw ter Cacti’s Network Weathermap plug-in, which system administrators use to visualize network activity.

Security rock-hard Trend Micro uncovered fresh crypto mining campaign, a cybercriminal tempo has made almost $75,000 by installing a Monero miner on vulnerable Linux servers.

The hackers are exploiting a five-year-old vulnerability ter the Cacti “Network Weathermap” plugin and according to Trend Micro this campaign is linked to a previous cryptocurrency-mining campaign that used the JenkinsMiner malware.

Ter this last campaign that is targeting Linux servers, hackers exploited the CVE-2013-2618 vulnerability ter Cacti plugin which is an open-source network monitoring and graphing implement.

“This campaign’s operators were exploiting CVE-2013-2618, a dated vulnerability ter Cacti’s Network Weathermap plug-in, which system administrators use to visualize network activity.” reads the analysis pulished by Trend Micro.

“As to why they’re exploiting an old security flaw: Network Weathermap only has two publicly reportedvulnerabilities so far, both from June 2014. It’s possible thesis attackers are taking advantage not only of a security flaw for which an exploit is readily available but also of patch lig that occurs te organizations that use the open-source device.”

The flaw could be exploited by attackers to execute arbitrary code on vulnerable systems, te this case, hackers downloaded and installed a customized version of XMRig, a legitimate Monero mining software (dada.x86_64 spil of 01/28/2018, earlier named spil xig or nkrb). XMRig supports both 32-bit and 64-bit Windows and Linux operating systems.

To build up persistence, hackers modified the local cron jobs to trigger a “watchd0g” Bash script every three minutes, the script checked if the Monero miner wasgoed still active and restarted it te case it wasgoed down.

“Code is written ter /etc/rc.local, which means that each time a system is restarted, watchd0g.sh is executed. The modification of /etc/crontab results ter watchd0g.sh being run every three minutes. It then modifies the Linux kernel parameter vm.nr_hugepages to the recommended value for mining Monero (XMR). It also ensures that the watchd0g.sh process runs or re-downloads and executes the opstopping if it terminates.” proceeds the analysis.

The researchers analyzed five malware samples that led them to two unique login usernames, matching the Monero wallets where the mining pool payments are sent.

According to Trend Micro, hackers made approximately 320 XMR (harshly $75,000), most of the Linux servers were located ter Japan (12%), China (10%), Taiwan (10%), and the US (9%).

Trend Micro recommends keeping internal to the environment gegevens from Cacti and also keeping systems updated with the latest patches.

“While this permits systems or network administrators to conveniently monitor their environments (with just a browser bookmark, for example), it also does the same for threat actors.” concluded Trend Micro.

Related movie: Robo fish review


Leave a Reply

Your email address will not be published. Required fields are marked *