• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new migo malware targeting redis servers for cryptocurrency mining

New Migo Malware Targeting Redis Servers for Cryptocurrency Mining

You are here: Home / General Cyber Security News / New Migo Malware Targeting Redis Servers for Cryptocurrency Mining
February 20, 2024

A novel malware campaign has been observed focusing on Redis servers for first obtain with the final target of mining cryptocurrency on compromised Linux hosts.

“This specific marketing campaign requires the use of a quantity of novel technique weakening techniques towards the details shop itself,” Cado security researcher Matt Muir said in a specialized report.

The cryptojacking attack is facilitated by a malware codenamed Migo, a Golang ELF binary that arrives equipped with compile-time obfuscation and the means to persist on Linux equipment.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The cloud security firm reported it detected the campaign following it identified an “strange collection of commands” focusing on its Redis honeypots that are engineered to lower security defenses by disabling the subsequent configuration possibilities –

  • shielded-manner
  • reproduction-read-only
  • aof-rewrite-incremental-fsync, and
  • rdb-help save-incremental-fsync

It truly is suspected that these selections are turned off in buy to deliver added commands to the Redis server from external networks and aid upcoming exploitation devoid of attracting a lot attention.

This stage is then followed by threat actors environment up two Redis keys, a person pointing to an attacker-managed SSH crucial and the other to a cron job that retrieves the destructive principal payload from a file transfer assistance named Transfer.sh, a approach earlier noticed in early 2023.

The shell script to fetch Migo utilizing Transfer.sh is embedded in a Pastebin file which is, in turn, received making use of a curl or wget command.

Redis Servers for Cryptocurrency MiningPersistence

The Go-primarily based ELF binary, in addition to incorporating mechanisms to resist reverse engineering, acts as a downloader for an XMRig installer hosted on GitHub. It is also liable for accomplishing a series of steps to create persistence, terminate competing miners, and launch the miner.

On prime of that, Migo disables Security-Enhanced Linux (SELinux) and lookups for uninstallation scripts for checking brokers bundled in compute circumstances from cloud providers this sort of as Qcloud and Alibaba Cloud. It additional deploys a modified model (“libsystemd.so”) of a well known consumer-method rootkit named libprocesshider to disguise processes and on-disk artifacts.

It truly is worthy of pointing out that these steps overlap with strategies adopted by identified cryptojacking teams like TeamTNT, WatchDog, Rocke, and risk actors connected with the SkidMap malware.

Cybersecurity

“Interestingly, Migo appears to recursively iterate as a result of files and directories beneath /etcetera,” Muir famous. “The malware will only go through information in these locations and not do just about anything with the contents.”

“1 concept is this could be a (weak) attempt to confuse sandbox and dynamic analysis remedies by carrying out a substantial variety of benign steps, ensuing in a non-malicious classification.”

One more hypothesis is that the malware is seeking for an artifact which is unique to a focus on atmosphere, even though Cado reported it located no evidence to help this line of reasoning.

“Migo demonstrates that cloud-concentrated attackers are continuing to refine their procedures and increase their potential to exploit web-facing services,” Muir stated.

“Despite the fact that libprocesshider is often utilized by cryptojacking campaigns, this unique variant involves the skill to conceal on-disk artifacts in addition to the malicious procedures themselves.”

Uncovered this article attention-grabbing? Adhere to us on Twitter  and LinkedIn to read far more special content material we post.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «lockbit ransomware operation shut down; criminals arrested; decryption keys released LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released
Next Post: VMware Alert: Uninstall EAP Now – Critical Flaw Puts Active Directory at Risk vmware alert: uninstall eap now critical flaw puts active»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.