Image credit: QuoteInspector
A new strand of Golang malware discovered this week installs the well-known Monero cryptocurrency miner, XMRig on infected servers.
The wormable malware exploits popular vulnerabilities such as an RCE (Remote Code Execution) flaw in Oracle WebLogic tracked as CVE-2020-14882.
This week, researchers at Intezer have revealed a new strand of Golang malware that exploits different vulnerabilities on both Linux and Windows servers to eventually turn them into Monero (XMR) miners.
“The attack uses three files: a dropper script (bash or powershell), a Golang binary worm, and an XMRig Miner—all of which are hosted on the same C&C,” explained Intezer security researcher Avigayil Mechtinger.
To began its exploitation activities, the malware scans the network for open ports in a TCP SYN attack. The list of services (and ports) it targets includes Apache Tomcat and Jenkins (8080), MySQL (3306), and WebLogic (7001).
Once it finds one or more of these open ports, the worm starts brute-forcing these, such as by trying commonly used username-password combinations and exploit payloads, to gain further access to vulnerable systems, and to spread itself.
“Post exploitation, the malware will deliver a loader script: ld.sh for Linux and ld.ps1 for Windows. The loader is responsible for dropping and running the XMRig Miner and the Golang worm on the exploited service,” explains Mechtinger.
At the time of Intezer’s analysis, the malware had zero detection rate, according to VirusTotal.
By comparison, the same sample is now being detected by over 40% of the antivirus engines today, as observed by Security Report.
“In 2020, we saw a noticeable trend of Golang malware targeting different platforms, including Windows, Linux, Mac and Android. We assess with high confidence that this will continue in 2021,” reads Intezer’s post.
The fact that the worm has identical code for both its PE and ELF variants, with the latter having been undetected in VirusTotal for long is an indication of ongoing evasive Linux threads that fly under the radar of most security products.
Intezer’s detailed research findings have been provided in their blog post. Joakim Kennedy has also been thanked by the company for his contribution to the research.
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the…
Rogue WordPress Plugin Found to Steal Credit Card Information in Magecart Campaign Threat hunters have…
The Assembly of the Republic of Albania and telecom company One Albania have recently fallen…
The banking malware Carbanak has resurfaced with updated tactics, incorporating attack vendors and techniques to…
One of the world's largest theme park operators, Parques Reunidos has disclosed a cybersecurity incident.…
Phishing kit used by multiple hacked sites generates a log in page on the fly…
This website uses cookies.