New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining

Aug 15, 2024Ravie LakshmananCommunity Safety / Cybercrime

Cybersecurity researchers have found a brand new variant of the Gafgyt botnet that is focusing on machines with weak SSH passwords to finally mine cryptocurrency on compromised situations utilizing their GPU computational energy.

This means that the “IoT botnet is targeting more robust servers running on cloud native environments,” Aqua Safety researcher Assaf Morag mentioned in a Wednesday evaluation.

Gafgyt (aka BASHLITE, Lizkebab, and Torlus), identified to be energetic within the wild since 2014, has a historical past of exploiting weak or default credentials to realize management of gadgets comparable to routers, cameras, and digital video recorders (DVRs). It is also able to leveraging identified safety flaws in Dasan, Huawei, Realtek, SonicWall, and Zyxel gadgets.

Cybersecurity

The contaminated gadgets are corralled right into a botnet able to launching distributed denial-of-service (DDoS) assaults towards targets of curiosity. There’s proof to recommend that Gafgyt and Necro are operated by a menace group known as Keksec, which can be tracked as Kek Safety and FreakOut.

IoT Botnets like Gafgyt are continually evolving so as to add new options, with variants detected in 2021 utilizing the TOR community to cloak the malicious exercise, in addition to borrow some modules from the leaked Mirai supply code. It is value noting that Gafgyt’s supply code was leaked on-line in early 2015, additional fueling the emergence of latest variations and diversifications.

Gafgyt Botnet Variant

The newest assault chains contain brute-forcing SSH servers with weak passwords to deploy next-stage payloads to facilitate a cryptocurrency mining assault utilizing “systemd-net,” however not earlier than terminating competing malware already operating on the compromised host.

It additionally executes a worming module, a Go-based SSH scanner named ld-musl-x86, that is answerable for scanning the web for poorly secured servers and propagating the malware to different techniques, successfully increasing the dimensions of the botnet. This includes SSH, Telnet, and credentials associated to recreation servers and cloud environments like AWS, Azure, and Hadoop.

Cybersecurity

“The cryptominer in use is XMRig, a Monero cryptocurrency miner,” Morag mentioned. “However, in this case, the threat actor is seeking to run a cryptominer using the –opencl and –cuda flags, which leverage GPU and Nvidia GPU computational power.”

“This, combined with the fact that the threat actor’s primary impact is crypto-mining rather than DDoS attacks, supports our claim that this variant differs from previous ones. It is aimed at targeting cloud-native environments with strong CPU and GPU capabilities.”

Information gathered by querying Shodan reveals that there are over 30 million publicly accessible SSH servers, making it important that customers take steps to safe the situations towards brute-force assaults and potential exploitation.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.

Recent articles