• About
  • Advertise
  • Careers
  • Contact
Monday, February 6, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security Malware

Xbash is an “all in one” malware.

by Cyber360 News
November 11, 2019
in Malware
0
Xbash is an “all in one” malware.
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

Xbash is an “all in one” malware.

Palo Alto Networks’ Unit 42 researchers have come to the conclusion that the notorious Xbash malware that has been attacking Linux and Windows servers is being operated by the Iron Group which is an infamous hacker collective previously involved in a number of cyber crimes involving the use of ransomware and cryptominers.

Moreover, the APT threat actors from the Iron Group have been operating crypto transaction hijacking Trojans in the past. This time, they are using Xbash, a self-propagating malware mash-up that is equipped with multiple features. It can serve as ransomware, a botnet, worm, disk wiper and crypto-miner simultaneously.

Unit 42 division researchers Claud Xiao, Cong Zheng, and Xingyu Jin wrote in their blog post that it isn’t out of the ordinary to find multi-functional malware but they do admit that Xbash is somewhat too clever and unique. They write that the malware, if implemented fully, can spread across the entire network of an organization instantaneously.

They also explained that Xbash is utilizing its ransomware and botnet capabilities for targeting Linux servers, and using crypto-miner and self-propagating functionalities against Windows servers. Basically, the malware is designed to target and delete databases stored on Linux servers and the lost data cannot be recovered by the victims even if they pay the ransom because the malware lacks the capability of decrypting the data. It starts the attack by identifying unpatched vulnerabilities, and devices having weak passwords, which are identified by scanning protocols and ports such as:

“HTTP, VNC, MySQL, Memcached, MariaDB, FTP, Telnet, PostgreSQL, ElasticSearch, MongoDB, RDP, UPnP/SSDP, NTP, DNS, SNMP, LDAP, Rexec, Rlogic, Rsh, Rsync, Oracle database, CouchDB and phpMyAdmin.”

But it doesn’t search for weaknesses from randomly received IP addresses but fetches targeted IP addresses provided by its C&C server and also targets domains of public websites. It can even scan for vulnerable servers associated with the intranet of an enterprise. This isn’t the way Linux based malware typically function.

The way Xbash behaves largely depends upon the infected platform and the services that it runs. However, researchers have warned that once the malware manages to log-in successfully into a Linux server, it deletes all of the existing databases and creates new ones titled ‘PLEASE_READ_ME_XYZ.’

Moreover, it leaves a ransom note into the newly created databases’ WARNING table. Readers are instructed to deposit 0.02 bitcoin to the address mentioned by the attacker to recover the lost data otherwise the contents will be leaked on the internet. But this is a false promise because the data simply cannot be recovered by the malware.

Linux & Windows hit with disk wiper, ransomware & cryptomining Xbash malware

As noted by the researchers:

“We see no evidence that the attackers are actually making good on their promise and helping the victims restore their deleted databases. In fact, contrary to the ransom note, we found no evidence of code in Xbash that backs up the deleted databases at all.”

The motivation behind this campaign is yet unclear but researchers mentioned that attackers are only looking for money. So far, at least 48 users have fallen prey to their tactics and have paid 0.964 bitcoins or $6,000 in total to attackers as of Sept. 17.

Cyber360 News

Cyber360 News

Next Post
Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack

Black Hat 2019: Microsoft Protocol Flaw Leaves Azure Users Open to Attack

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In