• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers exploit misconfigured yarn, docker, confluence, redis servers for crypto

Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining

You are here: Home / General Cyber Security News / Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining
March 6, 2024

Threat actors are focusing on misconfigured and vulnerable servers jogging Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis products and services as portion of an rising malware campaign developed to supply a cryptocurrency miner and spawn a reverse shell for persistent distant accessibility.

“The attackers leverage these equipment to issue exploit code, getting edge of popular misconfigurations and exploiting an N-day vulnerability, to conduct Remote Code Execution (RCE) attacks and infect new hosts,” Cado security researcher Matt Muir reported in a report shared with The Hacker News.

The exercise has been codenamed Spinning YARN by the cloud security firm, with overlaps to cloud attacks attributed to TeamTNT, WatchDog, and a cluster dubbed Kiss-a-doggy.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


It all starts off with deploying four novel Golang payloads that are able of automating the identification and exploitation of susceptible Confluence, Docker, Hadoop YARN, and Redis hosts. The spreader utilities leverage masscan or pnscan to hunt for these expert services.

Cybersecurity

“For the Docker compromise, the attackers spawn a container and escape from it onto the fundamental host,” Muir stated.

The preliminary accessibility then paves the way for the deployment of supplemental applications to install rootkits like libprocesshider and diamorphine to conceal destructive procedures, fall the Platypus open-supply reverse shell utility, and in the end start the XMRig miner.

“It truly is obvious that attackers are investing important time into understanding the sorts of web-going through companies deployed in cloud environments, retaining abreast of described vulnerabilities in people services and making use of this knowledge to obtain a foothold in target environments,” the corporation stated.

The enhancement arrives as Uptycs exposed 8220 Gang’s exploitation of regarded security flaws in Apache Log4j (CVE-2021-44228) and Atlassian Confluence Server and Information Center (CVE-2022-26134) as portion of a wave of assaults targeting cloud infrastructure from May possibly 2023 via February 2024.

Crypto Mining

“By leveraging internet scans for vulnerable apps, the group identifies opportunity entry details into cloud techniques, exploiting unpatched vulnerabilities to gain unauthorized entry,” security researchers Tejaswini Sandapolla and Shilpesh Trivedi said.

“After within, they deploy a collection of highly developed evasion methods, demonstrating a profound knowing of how to navigate and manipulate cloud environments to their gain. This involves disabling security enforcement, modifying firewall guidelines, and getting rid of cloud security products and services, thus guaranteeing their destructive functions keep on being undetected.”

The attacks, which one out the two Windows and Linux hosts, purpose to deploy a cryptocurrency miner, but not ahead of taking a series of ways that prioritize stealth and evasion.

Cybersecurity

It also follows the abuse of cloud products and services principally meant for synthetic intelligence (AI) answers to drop cryptocurrency miners as perfectly as host malware.

“With equally mining and AI requiring accessibility to large amounts of GPU processing energy, you can find a specific diploma of transferability to their base components environments,” HiddenLayer observed very last 12 months.

Cado, in its H2 2023 Cloud Risk Findings Report, noted that danger actors are ever more focusing on cloud solutions that call for professional complex information to exploit, and that cryptojacking is no more time the only motive.

“With the discovery of new Linux variants of ransomware families, these as Abyss Locker, there is a worrying pattern of ransomware on Linux and ESXi techniques,” it mentioned. “Cloud and Linux infrastructure is now subject to a broader wide variety of attacks.”

Found this write-up attention-grabbing? Stick to us on Twitter  and LinkedIn to read a lot more unique material we article.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «exit scam: blackcat ransomware group vanishes after $22 million payout Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout
Next Post: Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware watch out for spoofed zoom, skype, google meet sites delivering»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.