Poorly Managed Linux SSH Servers Targeted for DDoS Bot and CoinMiner Attacks
Reading Time: 3 Minutes
Researchers at AhnLab Security Emergency Response Center (ASEC) have issued a warning about a surge in attacks targeting poorly managed Linux SSH servers, with a primary focus on installing DDoS bots and CoinMiners. The reconnaissance phase of these attacks involves threat actors performing IP scanning to identify servers with the SSH service running on port 22, subsequently launching brute force or dictionary attacks to obtain login credentials.
Once access is gained, threat actors can install malware to scan, perform brute force attacks, and even sell breached IP and account credentials on the dark web. Notable malware used in these attacks includes ShellBot, Tsunami, ChinaZ DDoS Bot, and XMRig CoinMiner.
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
A recent analysis by ASEC revealed that threat actors, upon successful login, executed commands to check the total number of CPU cores and downloaded a compressed file containing a port scanner and an SSH dictionary attack tool.
> grep -c ^processor /proc/cpuinfo |
The researchers believe that the tools employed in these attacks are based on those created by the PRG old Team, with each threat actor customizing the tools by modifying them.
Trending: OSINT Tool: sn0int
Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?
If you want to express your idea in an article contact us here for a quote: [email protected]
Source: securityaffairs.com