• About
  • Advertise
  • Careers
  • Contact
Saturday, March 25, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security Malware

The malware attack involves two stages including one in which existing cryptomining malware is removed.

by Cyber360 News
November 11, 2019
in Malware
0
The malware attack involves two stages including one in which existing cryptomining malware is removed.
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

The malware attack involves two stages including one in which existing cryptomining malware is removed.

The IT security researchers at Trend Micro have discovered a new malware campaign targeting Elasticsearch databases in the wild.

The campaign takes advantage of unprotected or publicly available Elasticsearch databases, infect them with malware before turning them into botnet zombies to carry out distributed-denial-of-service (DDoS) attacks.

According to researchers, the malware used in the attack is Setag backdoor originally discovered in 2017. Setag is equipped with capabilities like launching DDoS attacks and stealing system information.

See: EvilGnomes Linux malware record activities & spy on users

Further analysis into the binaries unveiled presence of BillGates malware as well. BillGates malware surfaced back in 2014 bearing the same capabilities as Setag including launching DDoS attacks and compromising the targeted device.

New malware attack turns Elasticsearch databases into DDoS botnet

Attack’s workflow (Image: Trend Micro)

The malware attacks in two stages. In the first stage of the attack, the malware runs script s67.sh to shut down the firewall and define which shell should be used. In the second stage of the attack, the malware deletes some files including various configuration files from the /tmp directory and existing cryprominers installed by other threat actors – All this to run its own operation.

“The ways that the scripts are retrieved are notable,” researchers said in their blog post. “Using expendable domains, for instance, allows the attackers to swap URLs as soon as they are detected.”

It is worth noting that threat actors are using compromised websites to drop their payload. Trend Micro researchers fear that abusing compromised websites may also let them evade detection of websites especially those developed by the attackers. These capabilities of the malware are a “red flag.”

“The cybercriminals or threat actors behind this attack used URL encoding, staged where the scripts are retrieved, and compromised legitimate websites could mean they are just testing their hacking tools or readying their infrastructure before mounting actual attacks.”

Remember, ElasticSearch servers have a history with malware. In September 2017, Bob Diachenko, a security researcher identified over 4,000 ElasticSearch servers hosting PoS malware. In total Bob identified over 15,000 servers on ElasticSearch that did not possess any authentication and password protection.

See: Private data of more than 82 million US citizens left exposed on Elasticsearch server

Any business using Elasticsearch should watch out for the new attack. Elasticsearch has already issued a patch to fix the vulnerability exploited by this attack, therefore, implement the patch and secure yourself from becoming the next victim.

Did you enjoy reading this article? Kindly do like our page on Facebook and follow us on Twitter.

Cyber360 News

Cyber360 News

Next Post
Agent Smith malware exploits Android vulnerabilities to target unsuspected users for credential stealing.

Agent Smith malware exploits Android vulnerabilities to target unsuspected users for credential stealing.

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In