• krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • Savvy cryptomining malware campaign targets Asian cloud service providers
    Home Malware Savvy cryptomining malware campaign targets Asian cloud service providers

    Savvy cryptomining malware campaign targets Asian cloud service providers

    Source Link

    Asian cloud service providers have been targeted by a sophisticated malware campaign designed to steal computing power for mining cryptocurrency. The attack techniques deployed by the CoinStomp malware include timestomping (modification of a file’s timestamp), removal of system cryptographic policies, and use of a reverse shell to initiate command and control communications with the malicious software.

    “Timestomping has been used by the Rocke group in prior cryptojacking attacks,” Matt Muir, a researcher for Cado Security, wrote at the company’s website. “However, it’s not a technique commonly seen in the wild. Generally, this technique is employed as an anti-forensics measure to confuse investigators and foil remediation efforts.”

    Critical files are frequently changed by an attacker, explains Gal Lapid, a security researcher and developer at Cybellum. “Many times, these files are inside folders with many files which were made at the same time, and once you have one file ‘out of place’ because it was recently altered, this can raise some red flags,” he says. “So, attackers copy the timestamp of the other files inside the folder, and thus dodge detection.”

    Malware removes cryptographic policy files

    Mike Parkin, an engineer with Vulcan Cyber, noted that several APT groups include timestamp manipulation in their toolkit. “While it may not rise to the level of common, it’s not an obscure technique,” he says.

    The malware also issues commands to remove cryptographic policy files on a system and even kill the cryptographic process. “Clearly, enforcement of cryptographic policies has a tangible effect on the deployment of malware,” Muir wrote. “Additional payloads may be prevented from being downloaded and malicious applications could be prevented from running if they make use of insecure protocols—as, in the case of malware, they often do.”

    CoinStomp group sophisticated and knowledgeable of cloud

    To issue commands and control the malware, a reverse shell is created using the /dev/tcp file on Linux systems. “Most Linux distributions support read/write operations to a remote host via the /dev/tcp device file,” Muir explained. “Naturally, this is perfect for malware developers as it’s an easy and natively-supported method of creating a reverse shell or C2 communication channel.”

    Copyright © 2022 IDG Communications, Inc.

    Related Articles

    Leave a Comment

    techhipbettruvabetnorabahisbahis forumutaraftarium24edueduseduseduseduedueduedueduedu
    rokubet casino
    kingbetting
    lüks casino güncel giriş
    padişahbet
    betmatik
    neyine casino giriş
    cashwin giris
    padişahbet güncel giriş
    vegabet güncel giriş
    betwild giris
    imajbet giriş
    sugar rush 1000
    betwild giris
    свит бонанза
    pin up aviator
    casinomilyon
    plinko romania
    rexbet giriş
    biabet giriş
    biabet giris