Regístrese ahora para una mejor cotización personalizada!

Meet CoinStomp: New cryptojacking malware targets Asian cloud service providers

Feb, 02, 2022 Hi-network.com

Researchers have discovered a new malware family targeting cloud services to mine cryptocurrency.

More Crypto

  • How do I buy Bitcoin? Here's how it works
  • The best crypto credit cards
  • Top crypto exchanges: The ones you need to know
  • Must-have cryptocurrency hardware wallets: Keep your cryptocurrency safe

Dubbed CoinStomp, the malware is compromised of shell scripts that "attempt to exploit cloud compute instances hosted by cloud service providers for the purpose of mining cryptocurrency," according to Cado Security. 

The firm's researchers say that the overall purpose of CoinStomp is to quietly compromise instances in order to harness computing power to illicit mine for cryptocurrency, a form of attack known as cryptojacking. 

A number of attack attempts have been focused, so far, on cloud service providers in Asia. 

Clues in code also referenced Xanthe, a cryptojacking threat group recently tied to the Abcbot botnet. However, the clue -- found in a defunct payload URL -- is not enough to firmly establish who is responsible for CoinStomp and may have been included in "an attempt to foil attribution," according to the team. 

CoinStomp has a number of interesting capabilities. One is its reliance on "timestomping" -- the manipulation of timestamps by running the touch -- command on Linux systems to update file modification and access times. 

"It seems likely that timestomping was employed to obfuscate usage of the chmod and chattr utilities, as forensic tools would display the copied versions of these binaries as being last accessed (executed) at the timestamp used in the touch command," Cado Security noted. 

In addition, the malware will attempt to tamper with Linux server cryptographic policies. These policies can prevent malicious executables from being dropped or executed, and so CoinStomp's developer has included features to disable system-wide cryptographic policies through a kill command. 

"This could undo attempts to harden the target machine by administrators, ensuring that the malware achieves its objectives," the researchers say.

CoinStomp will then establish a connection to its command-and-control (C2) server via a reverse shell. The script then downloads and executes further payloads as system-wide systemd services, complete with root privileges. 

These include binaries to potentially create backdoors and a custom version of XMRig, legitimate Monero mining software abused for criminal purposes. 

"CoinStomp demonstrates the sophistication and knowledge of attackers in the cloud security space," Cado Security says. "Employing anti-forensics techniques and weakening the target machine by removing cryptographic policies demonstrates not only a knowledge of Linux security measures but also an understanding of the incident response process."

See also

  • Cryptojacking now added to list of cryptocurrency threats
  • Abcbot botnet is linked to Xanthe cryptojacking group
  • Cryptojacking campaign strikes China with fileless attacks

Have a tip?Get in touch securely via WhatsApp Signal at +447713 025 499, or over at Keybase: charlie0


Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Etiquetas calientes: tecnología seguridad

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.