Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:00 AM
Larry Loeb
Larry Loeb
Larry Loeb

Cryptominer Delivers New Kind of Malware

Malicious actors seem to be beginning to turn to Golang as a malware language since it is not typically picked up by antivirus software.

F5 researchers uncovereda cryptominer campaign (Monero, of course, for the anonymity) that has been delivering a new kind of Golang malware that targets Linux-based servers. Golang malware has been minimal to nonexistent in the known threat landscape. It became detectable in mid-2018 and has continued throughout 2019.

For the less geeky out there, this is what Wikipedia says about Go, the language in Golang. "Go is a statically typed compiled language in the tradition of C, with memory safety, garbage collection, structural typing, and CSP-style concurrent programming features added. The compiler, tools and source code are all free and open source." Google designed it.

Free and open source. With concurrent programming features built-in, you say? Someone seems to be using new tools to get somewhere. Malicious actors seem to be beginning to turn to Golang as a malware language since -- aha! -- it is not typically picked up by antivirus software.

But in what manner were the new tools used? Let's look. How a malware propagates is where that malware usually shows off the tricks that it has in store.

F5 posted that, "The malware campaign propagates using 7 different methods: 4 web application exploits (2 targeting ThinkPHP, 1 targeting Drupal, and 1 targeting Confluence), SSH credentials enumeration, Redis database passwords enumeration, and also trying to connect other machines using found SSH keys."

Ok, that's a lot of arrows in that quiver.

As far as timelines go, F5 says that the operation appeared to start around June 10, 2019. The first exploit requests were seen around June 16. The botnet doing the Monero mining is currently estimated to include several thousand infected machines.

So, who is being creative with Go for money?

Doing an attribution on any software is a collection of probabilities. Calls are made on each element that comprises the malware, but the overall context may be critical. So, you enumerate what you know as a start.

The attacker uses the online clipboard service pastebin.com to host the spearhead bash script. Cheap and anonymous. Anyone could use it. But along with maintaining persistence, the script looks for process running from the /tmp directory and kills them. Intentionally, it keeps the processes that contain the strings for mysqli or mysqlc. F5 says that the malware is hosted on an already compromised Chinese ecommerce website. This is significant. Did the attackers hijack that website or did the owners of it install the malware themselves?

But another connection is there, says F5. "Several indicators, like the Pastebin and GitHhub usernames and the cloned projects, might imply that the attacker is a Chinese speaker," they said. The attacker is starting to fit a profile here.

Someone got kicked off their hidden mining server at the Ministry of Water and Power, I think, and has gotten creative about it.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-07-29
Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 e...
PUBLISHED: 2021-07-29
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malic...
PUBLISHED: 2021-07-28
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
PUBLISHED: 2021-07-28
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
PUBLISHED: 2021-07-28
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.