HomeCII/OTNear-perfctl Fileless Malware Targets Millions of Linux Servers

Near-perfctl Fileless Malware Targets Millions of Linux Servers

Published on

spot_img

A mysterious and multifaceted malware dropper has been wreaking havoc on Linux servers worldwide, infecting numerous victims with cryptomining and proxyjacking malware. After years of causing chaos, a recent analysis has uncovered its secrets, revealing a vast array of exploit paths used to compromise its targets.

Since its emergence, reports of the malware known as “perfctl” (also called perfcc) have flooded in from all corners of the globe, including the US, Russia, Germany, Indonesia, Korea, China, Spain, and beyond. Victims have struggled to combat the malware, with many attempting to eliminate it without success due to its ability to conceal itself and its persistent nature.

The malware operates by exploiting vulnerabilities and misconfigurations to gain initial access to servers. According to Aqua Nautilus, the malware has likely targeted millions of Linux servers and compromised thousands around the world. Any Linux server connected to the Internet is vulnerable to perfctl, making it essential for server owners to take proactive measures against this threat.

In addition to its cryptomining and proxyjacking activities, perfctl has been observed dropping TruffleHog, a legitimate penetration testing tool designed to uncover hardcoded secrets in source code. This suggests that the malware may have additional malicious intentions, such as stealing and selling valuable data on the cyber underground market.

Researchers have identified a vast number of potential misconfigurations that perfctl exploits to infiltrate servers. By analyzing infected systems, they discovered a list of over 12,000 known server misconfigurations, nearly 2,000 unauthorized credential paths, more than 1,000 unauthorized login techniques, and numerous misconfigurations within various applications. These vulnerabilities provide perfctl with a wealth of opportunities to compromise servers and carry out its malicious activities.

Furthermore, perfctl can exploit bugs like CVE-2023-33246, a critical remote command execution vulnerability in Apache RocketMQ, to gain initial access to servers. This tactic allows the malware to operate stealthily and avoid detection by security measures.

To conceal its activities, perfctl employs sophisticated stealth and persistence mechanisms. The malware drops a backdoor and communicates via Tor to evade detection. It also uses process masquerading to hide its presence by mimicking legitimate system processes. These tactics make it challenging for security tools to detect and remove the malware effectively.

Despite its loud activities such as cryptomining and proxyjacking, perfctl remains hidden and persists on infected servers even after its binary is deleted. By deploying user-level and kernel-level rootkits, the malware can manipulate system functions, exfiltrate data, and establish persistence beyond the removal of primary payloads.

In conclusion, perfctl poses a significant threat to Linux servers worldwide, and server owners must take proactive steps to protect their systems. Mitigation strategies recommended by Aqua include patching vulnerabilities, restricting file execution, disabling unused services, implementing strict privilege management, and deploying runtime protection tools to detect and prevent malware like perfctl.

In a world where cyber threats continue to evolve, it is crucial for organizations to remain vigilant and proactive in defending against malicious actors. By staying informed about the latest cybersecurity trends and adopting best practices for securing digital assets, businesses can mitigate the risks posed by sophisticated malware like perfctl.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...