Thousands of Linux systems infected by stealthy malware since 2021

Date:

Share:



This Reddit comment posted to the CentOS subreddit is typical. An admin noticed that two servers were infected with a cryptocurrency hijacker with the names perfcc and perfctl. The admin wanted help investigating the cause.

“I only became aware of the malware because my monitoring setup alerted me to 100% CPU utilization,” the admin wrote in the April 2023 post. “However, the process would stop immediately when I logged in via SSH or console. As soon as I logged out, the malware would resume running within a few seconds or minutes.” The admin continued:

I have attempted to remove the malware by following the steps outlined in other forums, but to no avail. The malware always manages to restart once I log out. I have also searched the entire system for the string “perfcc” and found the files listed below. However, removing them did not resolve the issue. as it keep respawn on each time rebooted.

Other discussions include: Reddit, Stack Overflow (Spanish), forobeta (Spanish),  brainycp (Russian), natnetwork (Indonesian), Proxmox (Deutsch), Camel2243 (Chinese), svrforum (Korean), exabytes,>virtualmin,>serverfault and many others.

After exploiting a vulnerability or misconfiguration, the exploit code downloads the main payload from a server, which, in most cases, has been hacked by the attacker and converted into a channel for distributing the malware anonymously. An attack that targeted the researchers’ honeypot named the payload httpd. Once executed, the file copies itself from memory to a new location in the /temp directory, runs it, and then terminates the original process and deletes the downloaded binary.

Once moved to the /tmp directory, the file executes under a different name, which mimics the name of a known Linux process. The file hosted on the honeypot was named sh. From there, the file establishes a local command-and-control process and attempts to gain root system rights by exploiting CVE-2021-4043, a privilege-escalation vulnerability that was patched in 2021 in Gpac, a widely used open source multimedia framework.



Source link

━ more like this

Hollywood’s biggest filmmaker just came out clean about using AI in movies

Legendary filmmaker Steven Spielberg voiced concerns about the growing role of artificial intelligence in creative industries during an appearance at SXSW in Austin....

Windows 11 is readying support for 1,000+ Hz monitors, assuming you got one

Microsoft is quietly preparing Windows 11 for a new class of ultra-fast gaming monitors, even if most gamers won’t see them anytime soon....

ByteDance has reportedly suspended the global rollout of its new AI video generator

A month after Seedance 2.0's launch in China sparked cease-and-desist letters from Disney and Paramount Skydance over its use of copyrighted materials, its...

You might want to double-check before buying laptops from this Chinese brand

Independent testing has recently uncovered what it describes as a potential CPU mislabeling issue affecting multiple Chuwi laptops. In its latest report, Notebookcheck...

There’s a new global factor for a potentially serious price hike for PCs and mobile

A fresh supply chain shock may be brewing for the tech industry, and it could eventually affect the price of PCs, smartphones, and...
spot_img