• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cryptominers targeting misconfigured apache hadoop and flink with rootkit in

Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks

You are here: Home / General Cyber Security News / Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks
January 12, 2024

Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners in focused environments.

“This attack is especially intriguing owing to the attacker’s use of packers and rootkits to conceal the malware,” Aqua security scientists Nitzan Yaakov and Assaf Morag stated in an examination revealed earlier this week. “The malware deletes contents of particular directories and modifies procedure configurations to evade detection.”

The infection chain targeting Hadoop leverages a misconfiguration in the YARN’s (Yet Yet another Source Negotiator) ResourceManager, which is dependable for tracking means in a cluster and scheduling purposes.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Particularly, the misconfiguration can be exploited by an unauthenticated, distant risk actor to execute arbitrary code by indicates of a crafted HTTP request, subject matter to the privileges of the user on the node in which the code is executed.

Cybersecurity

The attacks aimed at Apache Flink, similarly, choose goal at a misconfiguration that permits a distant attacker to attain code execution sans any authentication.

These misconfigurations are not novel and have been exploited in the previous by financially motivated teams like TeamTNT, which is known for its heritage of concentrating on Docker and Kubernetes environments for the goal of cryptojacking and other malicious activities.

But what can make the most recent established of attacks noteworthy is the use of rootkits to conceal crypto mining processes soon after acquiring an first foothold into Hadoop and Flink apps.

“The attacker sends an unauthenticated ask for to deploy a new application,” the scientists explained. “The attacker is able to run a remote code by sending a Submit ask for to the YARN, requesting to launch the new software with the attacker’s command.”

The command is intent-built to obvious the /tmp directory of all present material, fetch a file termed “dca” from a remote server, and execute it, followed by deleting all documents in the /tmp listing as soon as once again.

Cybersecurity

The executed payload is a packed ELF binary that acts as a downloader to retrieve two rootkits and a Monero cryptocurrency miner binary. It is well worth pointing out that various adversaries, like Kinsing, have resorted to using rootkits to conceal the presence of the mining process.

To attain persistence, a cron career is made to download and execute a shell script that deploys the ‘dca’ binary. Further more analysis of the risk actor’s infrastructure reveals that the staging server applied to fetch the downloader was registered on October 31, 2023.

As mitigations, it is really suggested that businesses deploy agent-centered security solutions to detect cryptominers, rootkits, obfuscated or packed binaries, as well as other suspicious runtime behaviors.

Uncovered this posting intriguing? Stick to us on Twitter  and LinkedIn to read additional exceptional information we article.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «act now: cisa flags active exploitation of microsoft sharepoint vulnerability Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability
Next Post: Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO applying the tyson principle to cybersecurity: why attack simulation is»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.