

Multiple Mozilla Firefox Products Vulnerabilities
June 13, 2024
Multiple Apache Products Vulnerabilities
June 13, 2024
Multiple Mozilla Firefox Products Vulnerabilities
June 13, 2024
Multiple Apache Products Vulnerabilities
June 13, 2024Severity
High
Analysis Summary
An ongoing campaign of cryptojacking has been brought to light by cybersecurity researchers, which mines Dero money using misconfigured Kubernetes systems. The activity was made public by a cloud security company, which stated it was an enhanced version of a financially driven operation that researchers had initially reported on in March 2023.
The researchers stated, “In this incident, the threat actor abused anonymous access to an Internet-facing cluster to launch malicious container images hosted at Docker Hub, some of which have more than 10,000 pulls.”
The first step in gaining access is to send the miner payloads to externally reachable Kubernetes API servers that have allowed anonymous authentication. In contrast to the 2023 version, which used the Kubernetes DaemonSet "proxy-api," the most recent flavor uses the DaemonSets "k8s-device-plugin" and "pytorch-container," which appear to be innocuous, to run the miner on every cluster node. Furthermore, the "pause" container's name is an attempt to mimic the real "pause" container, which is used to ensure network isolation and bootstrap pods.

The open-source Go binary bitcoin miner has been altered to hard-code the wallet address and unique Dero mining pool URLs. Additionally, it is obfuscated to thwart examination using the freely available UPX packer. The primary benefit of encoding the mining setup into the code is that it allows the miner to operate without the need for any command-line parameters, which are usually inspected by security measures. Researchers discovered other tools created by the threat actor, including a Windows sample of a Dero miner loaded with UPX and a dropper shell script intended to remove GMiner from GitHub and end rival miner operations on an affected computer.
To avoid suspicion and to blend in more naturally with legitimate online traffic, the attacker registered domains with innocent-looking names. This allowed them to conceal connections with mining pools that are otherwise well-known. The attacker's continuous attempts to modify their strategies and keep one step ahead of defenses are evident in these integrated tactics.
Impact
- Cryptocurrency Theft
- Financial Loss
- Security Bypass
Indicators of Compromise
IP
- 209.141.32.182
MD5
- 22de8e4b08be5c2b1cc5eb2012739786
- cc47cb1bbef442d2f6aa7bc0b0843c88
- b6224dc51657a32e1aec1ca2a74c424a
- eea6a4938a53eb5e4e254812b3f150c6
- 0576d33ec4bcd20966c3a24c210e0cad
- 207e358ed42fe1346213480f64a91442
- 7c28e0727c74890b3998716967ab8339
- 42e82a37cc6b44f7bc58c6ef6bf3e9e2
SHA-256
- 68656198c24d6b32c4916a5686906c62baf7d6baae3b1d7dc615e43cb6d3fca8
- 49e8422e5f273a564c15755711ab2a35a1deb2105bbe1a0a8ce670c9b38721e5
- ad2ee0040f88a9001a32f945ce15de2dd1126c0f9f6cb626f2de0163792d8ff7
- 649a6fa70b26e5382652808348522b5e7f43f2f77a1b10a4cc5e5bfd5cb80327
- 06d080c816f099cccab56e4b596128e73cd63f524bdc2ddf5dd78c26f409f219
- 561790bd60258e056c72755bbaf848cfe5c3af548882c6a6579a599192bce3d2
- e1de787777faba85dcca4e10d945553aefdba14b1995cca7cf0721ee571c7e96
- 9131aac1df4b3a610f5fe69c55fdc19f07055648c0081e61536eb903e0914dc2
SHA1
- 427aee9ff60df3c102c3feab5319da34ecbf4b70
- 464c26c2ed6c06508ce975aeee2d589c9a2fdac2
- 244e98c20acb54d7ef65b57d4cd364aa9d46731d
- 02e20e6d1b870d1365028246617ede951f399567
- 59a835e812374c748d038498b70c04d0f36a8751
- 812860c0db73cb2224fe862c0bfd8c7485fc0807
- 8fd9157811ea69a7253d3fadbea19b4cbb1a6ccd
- 8c6793ec6b0459a75f114d0d18785af9ca56b75e
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Ensure all operating systems and software are up to date with the latest security patches.
- Employ reliable antivirus and antimalware software to detect and block known threats.
- Regularly update these tools to maintain the latest threat intelligence.
- Implement IDPS to detect and prevent unusual network activity, system behavior, or similar threats.
- Enabling two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don’t lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Use email filtering solutions to block malicious attachments and links that may deliver malware to users via phishing emails.
- Segment your network to limit lateral movement for attackers.
- Employ application whitelisting to only allow approved software to run on systems, reducing the risk of unauthorized applications being executed.
- Implement robust monitoring solutions to detect any unusual or suspicious activities, such as unauthorized access attempts or data exfiltration. Establish an effective incident response plan to quickly respond to and mitigate any potential breaches.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by info-stealers and other types of malware.