Stories
Slash Boxes
Comments

SoylentNews is people

posted by chromas on Saturday June 15 2019, @04:30AM   Printer-friendly
from the post-fix-you-will-be-running-PostFix dept.

A flaw in versions 4.87 to 4.91 of the Exim mail transfer agent (MTA) on Linux systems is being actively exploited in the wild. Exim version 4.92 is not vulnerable.

Specifically under attack is a flaw in Exim-based mail servers, which run almost 57 percent of the internet's email servers. Attackers are exploiting the flaw, discovered last week, to take control of the victim machines, search the internet for other machines to infect, and to initiate a cryptominer infection.

The vulnerability being exploited is an input validation failure on the recipient address on an incoming message.

An initial attack was detected by researcher Freddie Leeman on June 9th.

The more recent and sophisticated campaign first installs an RSA private authentication key on the vulnerable SSH server for root authentication. Once remote command-execution is established, the attacker then deploys a port scanner, to sniff out other vulnerable servers and installs a coin-miner.

In addition, the campaign appears to be "highly pervasive" with extra measures – such as installing several payloads at different stages including the port scanner and coin-miner – for persistence on the infected system.

It is clear that the attackers went to great lengths to try to hide the intentions of their newly-created worm," researchers said. "They used hidden services on the TOR network to host their payloads and created deceiving windows ivulnerable exim serverscon files [which is actually a password protected zip archive containing the coin miner executable] in an attempt to throw off researchers and even system administrators who are looking at their logs."

The attack is still being researched and users of vulnerable versions of Exim are being urged to patch their systems.

Related
400,000 Servers Using Exim May be at Risk of Serious Code-Execution Attacks


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0, Troll) by Subsentient on Saturday June 15 2019, @06:16AM (2 children)

    by Subsentient (1111) on Saturday June 15 2019, @06:16AM (#855923) Homepage Journal

    I use postfix. Suck it, normies. Faggots are using the most popular mail transfer agent, like plebs.

    --
    "It is no measure of health to be well adjusted to a profoundly sick society." -Jiddu Krishnamurti
    Starting Score:    1  point
    Moderation   -2  
       Flamebait=1, Troll=1, Disagree=1, Total=3
    Extra 'Troll' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   0  
  • (Score: 0) by Anonymous Coward on Saturday June 15 2019, @09:46PM

    by Anonymous Coward on Saturday June 15 2019, @09:46PM (#856075)

    I thought postfix was the most popular. I tried to find a good guide for SendMail and Dovecot and got poor results.

  • (Score: 2) by VLM on Sunday June 16 2019, @03:08PM

    by VLM (445) on Sunday June 16 2019, @03:08PM (#856247)

    In the old days I was all about emails of logs but that results in a lot of spam and I moved toward ELK stacks or at least simple syslog forwarding to a central log host and I often don't have email set up / installed, certainly no port 25 allowed thru the firewall.