Thousands of Linux systems infected by stealthy malware since 2021

You May Be Interested In:Devs say AI crawlers dominate traffic, forcing blocks on entire countries



This Reddit comment posted to the CentOS subreddit is typical. An admin noticed that two servers were infected with a cryptocurrency hijacker with the names perfcc and perfctl. The admin wanted help investigating the cause.

“I only became aware of the malware because my monitoring setup alerted me to 100% CPU utilization,” the admin wrote in the April 2023 post. “However, the process would stop immediately when I logged in via SSH or console. As soon as I logged out, the malware would resume running within a few seconds or minutes.” The admin continued:

I have attempted to remove the malware by following the steps outlined in other forums, but to no avail. The malware always manages to restart once I log out. I have also searched the entire system for the string “perfcc” and found the files listed below. However, removing them did not resolve the issue. as it keep respawn on each time rebooted.

Other discussions include: Reddit, Stack Overflow (Spanish), forobeta (Spanish),  brainycp (Russian), natnetwork (Indonesian), Proxmox (Deutsch), Camel2243 (Chinese), svrforum (Korean), exabytes, virtualmin, serverfault and many others.

After exploiting a vulnerability or misconfiguration, the exploit code downloads the main payload from a server, which, in most cases, has been hacked by the attacker and converted into a channel for distributing the malware anonymously. An attack that targeted the researchers’ honeypot named the payload httpd. Once executed, the file copies itself from memory to a new location in the /tmp directory, runs it, and then terminates the original process and deletes the downloaded binary.

Once moved to the /tmp directory, the file executes under a different name, which mimics the name of a known Linux process. The file hosted on the honeypot was named sh. From there, the file establishes a local command-and-control process and attempts to gain root system rights by exploiting CVE-2021-4043, a privilege-escalation vulnerability that was patched in 2021 in Gpac, a widely used open source multimedia framework.

share Paylaş facebook pinterest whatsapp x print

Similar Content

AMD’s new Ryzen Z2 CPUs boost gaming handhelds, if you buy the best one
AMD’s new Ryzen Z2 CPUs boost gaming handhelds, if you buy the best one
Purple/blue rendering of a home with a number of different colored lights inside, with a circuit-like line leading into it.
Matter 1.4 has some solid ideas for the future home—now let’s see the support
Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram
Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram
StarCraft II goes free-to-play seven years after launch
StarCraft II goes free-to-play seven years after launch
A Pixel Tablet, showing a bunch of yellow app icons and widgets, with bird wings as a background.
Google seems to have called it quits on making its own Android tablets—again
Console makers seek to avoid 25% price bump driven by Trump’s trade war
Console makers seek to avoid 25% price bump driven by Trump’s trade war
The News Spectrum | © 2024 | News