Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

11:40 AM

Cryptominer Attacks Ramp Up, Focus on Persistence

The latest attacks, such as Skidmap and Smominru, add capabilities to allow them to persist longer on Windows and Linux systems, surviving initial attempts at eliminating them.

In 2018, opportunistic cybercriminals had an easy way to monetize compromised web servers: Add JavaScript from the cryptomining-as-a-service provider Coinhive to eke out small profits for every compromised server by surreptitiously having them do the cryptography tasks necessary to generate Monero cryptocurrency.

With Coinhive's shutdown in March 2019, however, cybercriminals have resorted to more standard tactics, infecting Windows and Linux servers and finding ways to allow their malware to persist for longer periods. 

Two research analyses released this week by Trend Micro and Guardicore highlight the techniques used by cybercriminals' attempts to maintain their control of compromised servers. In a September 16 report, security firm Trend Micro found that the Skidmap Linux malware uses a variety of techniques — from the complex, such as loading malicious kernel modules, to the simple, such as inserting SSH keys into the authorized-keys file. Meanwhile, the 2-year-old Smominru botnet has used a variety of techniques to hold its ground on the more than 4,900 networks and 90,000 servers a month the malware infects every month.

On compromised Windows servers, Smominru schedules tasks using scripts, exploits the SQL service, creates administrative users, and installs a remote access trojan, says Ophir Harpaz, a security researcher at Guardicore Labs.

"They are just shooting in as many directions as possible," she says, adding that the attackers are not just worried about defenders. "These threat actors are trying to eliminate each other, so the more ways you find to be persistence on the machine, the less chance you have of losing access to the compromised host."

While cryptomining peaked in 2018, when 42% of companies saw attacks, the attack technique is still a major threat, according to data from networking security firm Check Point Software Technologies. In the first half of 2019, the company found 21% of networks had one or more machines infected with cryptomining malware. That decline is due to the shutdown of the Coinhive mining service, which allowed attackers to inject unwanted — and many would say, malicious — JavaScript into websites to force browsers to process the resource-intensive computations required to "mine" for the Monero cryptocurrency. The service claimed to be making $250,000 a month while controlling 62% of the cryptojacking market

Because such easy-to-use services are no longer the rule, adding persistence to cryptomining malware has become a priority for cybercriminals, Augusto Remillano II and Jakub Urbanec, threat analysts at Trend Micro, stated in their analysis of Skidmap. The researchers found that the attackers, like the Smominru group, have taken a kitchen-sink approach, using techniques from Linux kernel module (LKM) rootkits to overwriting the rm binary for the Linux command used to remove software.

"Its use of LKM rootkits — given their capability to overwrite or modify parts of the kernel — makes it harder to clean compared to other malware," the researchers stated in the analysis. "In addition, Skidmap has multiple ways to access affected machines, which allow it to reinfect systems that have been restored or cleaned up."

In its research into Smominru, Guardicore's team found the credentials for a command-and-control server that collected information on the botnet, finding information and credentials for compromised servers. The security firm monitored the information on the server over time to study the infection patterns. About a quarter of the systems had been infected more than once, showing that the focus on persistence pays off for the attackers.

And the focus becomes more important because the vast majority of computers on the Internet are difficult to infect. For every organization serious about security, there are a few individuals or small businesses that have a few machines that have not been updated or secured, says Daniel Goldberg, a security researcher with Guardicore. 

"Many groups compete to be on the same small number of machines — it's still hundreds of thousands of machines, but only a fraction on what is on the Internet," he says. "There is this whole undergrowth of forgotten servers lying around on the Internet and available for hacking."

The company estimates that the botnet has control of an average of 6,500 processing cores per day to use for cryptomining.

Therefore, any attempt at persistence can pay off for attackers. The Linux cryptominer Skidmap, for example, even adds an SSH key to the authorized keys file on Linux, allowing for a simple but effective form of a backdoor. This often works because companies do not monitor those files, Kevin Bocek, vice president of security strategy and threat intelligence at security firm Venafi, said in a statement. 

"We see these tactics used so effectively to target critical infrastructure because security teams rarely have oversight of SSH keys that control access," he said. "These keys don't expire — creating an encrypted backdoor that attackers can use until they're detected."

While the recent attack focus on both Windows and Linux, some experts see Linux servers to be an increasingly valuable target for attackers focused on cryptomining. 

"Over the last several months, we've seen more evidence that suggests that attackers are continuing to increase their focus on Linux as a vehicle to obtain access to compute and bandwidth resources," Casey Ellis, chief technology officer and founder of crowdsourced security firm Bugcrowd, said in a statement. 

For server administrators, the best defense is to keep your servers updated and patched and monitor their performance. If the company often uses open source repositories, they should be verified. And all systems should enforce the concepts of least privilege, only allowing the level of access necessary to the user.

While cryptomining is often not considered as significant a threat as, say, ransomware, allowing attackers to steal processing power can have a significant impact on a company, Trend Micro's researchers said.

"Cryptocurrency-mining threats don't just affect a server or workstation's performance — they could also translate to higher expenses and even disrupt businesses especially if they are used to run mission-critical operations," they stated in their analysis. "Given Linux's use in many enterprise environments, its users, particularly administrators, should always adopt best practices."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-23
PingID Integration for Windows Login before 2.4.2 allows local users to gain privileges by modifying CefSharp.BrowserSubprocess.exe.
PUBLISHED: 2020-09-23
** UNSUPPORTED WHEN ASSIGNED ** peg-markdown 0.4.14 has a NULL pointer dereference in process_raw_blocks in markdown_lib.c. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
PUBLISHED: 2020-09-23
A vulnerability in the web management interface of Cisco Unity Connection could allow an authenticated remote attacker to overwrite files on the underlying filesystem. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP re...
PUBLISHED: 2020-09-23
A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper validation of incoming emails. An attacker could exploit t...
PUBLISHED: 2020-09-23
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (UCM) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based...