Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Saturday April 10 2021, @06:54PM   Printer-friendly
from the gold-digger dept.

https://arstechnica.com/gadgets/2021/04/windows-and-linux-devices-are-under-attack-by-a-new-cryptomining-worm/

A newly discovered cryptomining worm is stepping up its targeting of Windows and Linux devices with a batch of new exploits and capabilities, a researcher said.

Research company Juniper started monitoring what it's calling the Sysrv botnet in December. One of the botnet's malware components was a worm that spread from one vulnerable device to another without requiring any user action. It did this by scanning the Internet for vulnerable devices and, when found, infecting them using a list of exploits that has increased over time.

The malware also included a cryptominer that uses infected devices to create the Monero digital currency. There was a separate binary file for each component.
[...]
"Based on the binaries we have seen and the time when we have seen them, we found that the threat actor is constantly updating its exploit arsenal," Juniper researcher Paul Kimayong said in a Thursday blog post.

Straight from the above blog post, the malware's exploits include:

Exploit Software
CVE-2021-3129 Laravel
CVE-2020-14882 Oracle Weblogic
CVE-2019-3396 Widget Connector macro in Atlassian Confluence Server
CVE-2019-10758 Mongo Express
CVE-2019-0193 Apache Solr
CVE-2017-9841 PHPUnit
CVE-2017-12149 Jboss Application Server
CVE-2017-11610 Supervisor (XML-RPC)
Apache Hadoop Unauthenticated Command Execution via YARN ResourceManager (No CVE) Apache Hadoop
Brute force Jenkins Jenkins
Jupyter Notebook Command Execution (No CVE) Jupyter Notebook Server
CVE-2019-7238 Sonatype Nexus Repository Manager
Tomcat Manager Unauth Upload Command Execution (No CVE) Tomcat Manager
WordPress Bruteforce WordPress


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by TheRaven on Tuesday April 13 2021, @11:57AM

    by TheRaven (270) on Tuesday April 13 2021, @11:57AM (#1136949) Journal

    So yes, doing a quick benchmark and deciding that the machine would take 6 months to generate 0.00001 of some crypto coin

    That's not really how it works. The 'mining' is probabilistic. If you're trying a lot fewer hashes per second than another machine, you may still find the right one early, you're just a lot less likely to. If you're not paying for power, it's always worth adding more compute, even if it's only a small amount.

    It's also not clear to me that you'd be more likely to be noticed on slower machines. People with slow machines already expect things to be slow, people who buy fast machines are likely to notice if they're not getting what they paid for.

    All of that said, normally this kind of malware cloaks itself so that it doesn't show up in process monitors and runs at the equivalent of idle priority, so it shouldn't actually slow things down except by maybe making thermal throttling kick in earlier.

    --
    sudo mod me up
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2