#Stealthy

2024-10-08

New [Perfctl] Malware Targets Linux Servers for Cryptocurrency Mining & Proxyjacking. :linux:

According to Aqua Nautilus researchers who discovered perfctl, the malware likely targeted millions of Linux servers in recent years and possibly caused infections in several thousands of them.

aquasec.com/blog/perfctl-a-ste

#linux #server #perfctl #stealthy #malware #it #security #privacy #engineering #technology #media #news

According to Aqua Nautilus, the primary purpose of perfctl is for cryptomining, using the compromised servers to mine the hard-to-trace Monero cryptocurrency. However, it could be easily used for more damaging operations.

The researchers have also observed exploitation of CVE-2023-33246, a remote command execution impacting Apache RocketMQ versions 5.1.0 and older, and CVE-2021-4034 (PwnKit), an elevation of privilege flaw in Polkit.[ImageSource: Aqua Nautilus]

Locations where the malware drops files.

Once initial access is established, the packed and obfuscated payload, named "httpd", is downloaded from the attacker's server and executed. It then copies itself in the /tmp directory under the "sh" name and then deletes the original binary.

The new process assumes the same name ("sh"), essentially blending with normal Linux system operations.

Additional copies are created in other system locations, such as "/root/.config", "/usr/bin/" and "usr/lib" to ensure persistence in the case of a cleanup.[ImageSource: Aqua Nautilus]

Overview of perfctl attack flow.

When launched, perfctl opens a Unix socket for internal communications and establishes an encrypted channel with the threat actor's servers over TOR, making it impossible to decipher the exchange.

It then drops a rootkit named 'libgcwrap.so' which hooks into various system functions to modify authentication mechanisms and intercept network traffic as needed to facilitate evasion.

Additional userland rootkits are also deployed, replacing the ldd, top, crontab and lsof utilities with trojanized versions, again, preventing direct detection of the malware's activities.

Finally, an XMRIG miner is dropped onto the system and executed to mine Monero using the server's CPU resources.
Marfisamarfisa
2024-08-27
2023-12-23

While the malware is capable of collecting files of interest and system information, it lacks some features found in advanced stealer malware in the cybercrime underground.

#Cybersecurity #India #Malware #Phishing #Rust #RusticWeb #Stealthy #Government

cybersec84.wordpress.com/2023/

2023-11-17

Are you ready for a #spooky and #stealthy #adventure? 🕵️‍♀️👻 Check out #HauntedHouse. Sneak, solve puzzles, and survive a ghost-infested mansion to save your uncle. 😱 It’s cute, challenging, and nostalgic. 🎮 Out now! #Xbox #Switch #PS5 #PC #halloween

churapereviews.com/2023/11/17/

Constantijn ☮quite1enough
2023-07-23

Seems like could be totally blocked in

I can open it now only with certain browser extensions (like in ) or

Previously it opened just fine without any shenanigans

When I noticed it first time there was no news on the matter, but the wikipedia block is unfortunately confirmed - twitter.com/globalchecknet/sta

upd.
seems like it was purely technical issue, and I really hope that was the case

Screenshot of firefox browser page with "The connection has timed out" errorScreenshot of chrome browser page with "This site can't be reached" error
Gunnarssongunnarsson
2023-04-02

I've got a Plexgear GSW1016 PRO switch that has managed to leave pretty much zero traces across the internet. Stealthy.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst