• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft Spots Updated Cryptomining Malware Tool Targeting Linux Systems

You are here: Home / General Cyber Security News / Microsoft Spots Updated Cryptomining Malware Tool Targeting Linux Systems
July 1, 2022

Microsoft’s Security Intelligence staff has issued a new warning in opposition to a recognised cloud danger actor (TA) team.

Tracked as 8220 and energetic because early 2017, the group would have now up-to-date its malware toolset to breach Linux servers in buy to set up crypto miners as section of a extended-managing marketing campaign.

“The updates include things like the deployment of new versions of a cryptominer and an IRC bot, as properly the use of an exploit for a not too long ago disclosed vulnerability,” the technology giant wrote in a Twitter thread on Thursday.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The group has actively current its procedures and payloads about the final yr.”

In accordance to Microsoft, the most the latest campaign now targets i686 and x86_64 Linux units and makes use of RCE exploits for CVE-2022-26134 (Atlassian Confluence Server) and CVE-2019-2725 (Oracle WebLogic) for original access.

“After initial entry, a loader is downloaded,” described the security experts. “This loader evades detection by clearing log documents and disabling cloud monitoring and security instruments. Tamper defense abilities in Microsoft Defender for Endpoint assist protect security options.”

The loader would then obtain the pwnRig crpytominer and an IRC bot that operates instructions from a  command-and-manage (C2) server. It would then retain persistence by creating both a cronjob or a script operating each 60 seconds as nohup.

According to Microsoft, the malware also features self-propagating capabilities.

“The loader works by using the IP port scanner device ‘masscan’ to find other SSH servers in the network and then takes advantage of the GoLang-primarily based SSH brute power instrument ‘spirit’ to propagate. It also scans the regional disk for SSH keys to move laterally by connecting to known hosts.”

To guard networks in opposition to this menace, Microsoft claimed corporations really should safe methods and servers, use updates, and use excellent credential cleanliness. 

“Microsoft Defender for Endpoint on Linux detects destructive behaviors and payloads related to this campaign.”

The news comes times immediately after Akamai proposed the Atlassian Confluence flaw is at the moment witnessing 20,000 exploitation tries for each working day, released from about 6,000 IPs.

For context, the range represents a significant minimize when in comparison to the peak of 100,000 the business witnessed upon the bug disclosure on June 02 2022.


Some components of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Threat Actor Claims Responsibility For IBM and Stanford University Hack
Next Post: New ‘SessionManager’ Backdoor Targeting Microsoft Exchange Servers Worldwide Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.