新恶意软件瞄准暴露的Docker API进行加密货币挖矿

admin 2024年6月19日12:25:54评论17 views字数 3960阅读13分12秒阅读模式

新恶意软件瞄准暴露的Docker API进行加密货币挖矿

Cybersecurity researchers have uncovered a new malware campaign that targets publicly exposed Docket API endpoints with the aim of delivering cryptocurrency miners and other payloads.

网络安全研究人员揭露了一个新的恶意软件活动,其目标是针对公开暴露的Docket API端点,旨在交付加密货币挖矿程序和其他有效负载。

Included among the tools deployed is a remote access tool that's capable of downloading and executing more malicious programs as well as a utility to propagate the malware via SSH, cloud analytics platform Datadog said in a report published last week.

部署的工具中包括一种远程访问工具,可下载和执行更多恶意程序,以及一种通过SSH传播恶意软件的实用程序,云分析平台Datadog在上周发布的报告中表示。

Analysis of the campaign has uncovered tactical overlaps with a previous activity dubbed Spinning YARN, which was observed targeting misconfigured Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services for cryptojacking purposes.

对该活动的分析发现了与之前被称为“Spinning YARN”的活动的战术重叠,该活动旨在利用配置错误的Apache Hadoop YARN、Docker、Atlassian Confluence和Redis服务进行加密货币挖掘。

The attack commences with the threat actors zeroing in on Docker servers with exposed ports (port number 2375) to initiate a series of steps, starting with reconnaissance and privilege escalation before proceeding to the exploitation phase.

攻击始于攻击者将目标锁定在暴露端口(端口号2375)的Docker服务器上,以启动一系列步骤,从侦察和特权升级开始,然后进入利用阶段。

Payloads are retrieved from adversary-controlled infrastructure by executing a shell script named "vurl." This includes another shell script called "b.sh" that, in turn, packs a Base64-encoded binary named "vurl" and is also responsible for fetching and launching a third shell script known as "ar.sh" (or "ai.sh").

通过执行一个名为“vurl”的Shell脚本,从对手控制的基础架构中检索有效负载。这包括另一个名为“b.sh”的Shell脚本,它反过来打包了一个名为“vurl”的Base64编码二进制文件,并负责获取和启动第三个Shell脚本,称为“ar.sh”(或“ai.sh”)。

"The ['b.sh'] script decodes and extracts this binary to /usr/bin/vurl, overwriting the existing shell script version," security researcher Matt Muir said. "This binary differs from the shell script version in its use of hard-coded [command-and-control] domains."

安全研究人员Matt Muir说:“['b.sh']脚本解码并提取此二进制文件到/usr/bin/vurl,覆盖现有的Shell脚本版本。” “这个二进制文件在其使用硬编码的[命令和控制]域方面与Shell脚本版本不同。”

The shell script, "ar.sh," performs a number of actions, including setting up a working directory, installing tools to scan the internet for vulnerable hosts, disabling firewall, and ultimately fetching the next-stage payload, referred to as "chkstart."

Shell脚本“ar.sh”执行了许多操作,包括设置工作目录、安装工具以扫描互联网上的易受攻击主机、禁用防火墙,并最终获取下一阶段的有效负载,称为“chkstart”。

新恶意软件瞄准暴露的Docker API进行加密货币挖矿

A Golang binary like vurl, its main goal is to configure the host for remote access and fetch additional tools, including "m.tar" and "top," from a remote server, the latter of which is an XMRig miner.

像vurl这样的Golang二进制文件的主要目标是配置主机以进行远程访问,并从远程服务器获取其他工具,包括“m.tar”和“top”,后者是一个XMRig挖矿程序。

"In the original Spinning YARN campaign, much of chkstart's functionality was handled by shell scripts," Muir explained. "Porting this functionality over to Go code could suggest the attacker is attempting to complicate the analysis process, since static analysis of compiled code is significantly more difficult than shell scripts."

Muir解释说:“在原始的Spinning YARN活动中,chkstart的大部分功能由Shell脚本处理。” “将此功能移植到Go代码可能表明攻击者试图复杂化分析过程,因为编译代码的静态分析比Shell脚本困难得多。”

Downloading alongside "chkstart" are two other payloads called exeremo, which is utilized to laterally move to more hosts and spread the infection, and fkoths, a Go-based ELF binary to erase traces of the malicious activity and resist analysis efforts.

与“chkstart”一起下载的还有另外两个有效负载,称为exeremo,用于横向移动到更多主机并传播感染,以及fkoths,一个基于Go的ELF二进制文件,用于擦除恶意活动的痕迹并抵抗分析工作。

"Exeremo" is also designed to drop a shell script ("s.sh") that takes care of installing various scanning tools like pnscan, masscan, and a custom Docker scanner ("sd/httpd") to flag susceptible systems.

“Exeremo”还设计为释放一个Shell脚本(“s.sh”),负责安装各种扫描工具,如pnscan、masscan和自定义的Docker扫描工具(“sd/httpd”),以标记易受攻击的系统。

"This update to the Spinning YARN campaign shows a willingness to continue attacking misconfigured Docker hosts for initial access," Muir said. "The threat actor behind this campaign continues to iterate on deployed payloads by porting functionality to Go, which could indicate an attempt to hinder the analysis process, or point to experimentation with multi-architecture builds."

Muir说:“对Spinning YARN活动的这次更新显示了继续攻击配置错误的Docker主机以获取初始访问权限的意愿。” “这次活动背后的威胁行为者继续通过将功能移植到Go来迭代部署的有效负载,这可能表明试图阻碍分析过程,或者表明尝试进行多架构构建的实验。”


参考资料

[1]https://thehackernews.com/2024/06/new-malware-targets-exposed-docker-apis.html


原文始发于微信公众号(知机安全):新恶意软件瞄准暴露的Docker API进行加密货币挖矿

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年6月19日12:25:54
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   新恶意软件瞄准暴露的Docker API进行加密货币挖矿http://cn-sec.com/archives/2864603.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息