• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new cryptocurrency mining campaign targets linux systems and iot devices

New Cryptocurrency Mining Campaign Targets Linux Systems and IoT Devices

You are here: Home / General Cyber Security News / New Cryptocurrency Mining Campaign Targets Linux Systems and IoT Devices
June 23, 2023

Internet-experiencing Linux programs and Internet of Issues (IoT) gadgets are staying specific as part of a new marketing campaign intended to illicitly mine cryptocurrency.

“The risk actors guiding the attack use a backdoor that deploys a huge array of equipment and factors these kinds of as rootkits and an IRC bot to steal machine methods for mining operations,” Microsoft danger intelligence researcher Rotem Sde-Or stated.

“The backdoor also installs a patched variation of OpenSSH on affected gadgets, enabling risk actors to hijack SSH credentials, move laterally inside the network, and conceal destructive SSH connections.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


To pull off the scheme, misconfigured Linux hosts are brute-forced to achieve first entry, pursuing which the danger actors transfer to disable shell heritage and fetch a trojanized version of OpenSSH from a distant server.

The rogue OpenSSH deal is configured to install and launch the backdoor, a shell script that lets the attackers to distribute added payloads and carry out other post-exploitation routines.

Cybersecurity

This includes exfiltrating information about the product, installing open-supply rootkits named Diamorphine and Reptile from GitHub, and having techniques to obscure its exercise by clearing logs that could alert its existence.

“To be certain persistent SSH obtain to the unit, the backdoor appends two public keys to the approved_keys configuration data files of all people on the process,” the Windows maker explained.

The implant also seeks to monopolize the infected system’s methods by getting rid of competing crypto mining processes that may be previously running on it prior to launching its miner.

On top of that, it operates a modified model of ZiggyStarTux, an IRC-based mostly distributed denial-of-company (DDoS) consumer that’s able of executing bash commands issued from the command-and-control (C2) server. It really is centered on one more botnet malware termed Kaiten (aka Tsunami).

Linux Systems and IoT Devices

The attacks, the tech large pointed out, leverage an unnamed Southeast Asian economical institution’s subdomain for C2 communications in an attempt to disguise the malicious site visitors.

It’s well worth pointing out that the modus operandi specific by Microsoft overlaps with a latest report from the AhnLab Security Crisis Reaction Center (ASEC), which specific attacks focusing on exposed Linux servers with crypto mining malware and a Tsunami botnet variant dubbed Ziggy.

The operation has been traced again to an actor named asterzeu, who has available the toolkit for sale on the malware-as-a-company current market. “The complexity and scope of this attack are indicative of the initiatives attackers make to evade detection,” Sde-Or stated.

The growth comes as multiple known security flaws in routers, digital movie recorders, and other network software program are getting actively exploited by threat actors to deploy the Mirai botnet malware, in accordance to Akamai and Palo Alto Networks Unit 42.

“The Mirai botnet, uncovered again in 2016, is still active nowadays,” Uni 42 researchers said. “A substantial section of the explanation for its acceptance among danger actors lies in the security flaws of IoT units.”

“These distant code execution vulnerabilities targeting IoT products show a mixture of lower complexity and substantial impression, making them an irresistible goal for risk actors.”

Located this report attention-grabbing? Observe us on Twitter  and LinkedIn to examine extra exclusive content we put up.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «multi#storm campaign targets india and u.s. with remote access trojans MULTI#STORM Campaign Targets India and U.S. with Remote Access Trojans
Next Post: NSA Releases Guide to Combat Powerful BlackLotus Bootkit Targeting Windows Systems nsa releases guide to combat powerful blacklotus bootkit targeting windows»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.