HomeCII/OTSSH Server Vulnerable to 'Proxyjacking' Cyberattacks

SSH Server Vulnerable to ‘Proxyjacking’ Cyberattacks

Published on

spot_img

An active and lucrative cyber attack campaign has been discovered by researchers at the Akamai Security Intelligence Response Team (SIRT). The campaign involves threat actors exploiting vulnerable secure shell protocol (SSH) servers to launch Docker services that hijack a victim’s network bandwidth for financial gain. This emerging attack vector, known as proxyjacking, allows attackers to enlist victim servers into a peer-to-peer (P2P) proxy network without their knowledge.

Proxyjacking involves threat actors using SSH for remote access to victim servers and then running malicious scripts that connect them to legitimate proxy networks, such as Peer2Proxy or Honeygain. These networks allow users to share their internet bandwidth for a fee, and by enlisting victim servers, attackers can monetize their extra bandwidth with minimal resource load and less chance of discovery compared to other methods like cryptomining.

The researchers found that proxyjacking has the potential to earn cybercriminals hundreds of thousands of dollars per month in passive income. While the concept of proxyjacking is not entirely new, the ability to easily monetize it through mainstream companies is. This has led to an increase in proxyjacking attacks, posing a threat to both the corporate world and average consumers.

One of the advantages of proxyjacking for threat actors is the ability to hide their tracks by routing malicious traffic through multiple peer nodes before reaching its final destination. This makes it difficult for victims or researchers to pinpoint the origin of the nefarious activity, providing an attractive option for attackers looking to monetize their actions without facing consequences.

The researchers at Akamai identified the proxyjacking attack by decoding a double Base64-encoded Bash script used by an attacker to establish multiple SSH connections to one of their honeypots. The script transformed the compromised system into a node in the proxy network, allowing the attacker to profit from the shared bandwidth. The attackers employed stealthy and robust techniques to ensure the script operates regardless of the software installed on the victim host.

The script also downloaded an unmodified version of cURL, a command-line tool for data exchange between devices and servers. The tool served as the main component for the proxyjacking process, and if not present on the victim host, the attacker downloaded it on their behalf. Ultimately, the attackers installed a Docker container to handle the proxyjacking process and left the network without leaving a trace.

To defend against proxyjacking attacks, organizations should maintain vigilance on their networks to detect any abnormal behavior in bandwidth usage. For this specific attack, organizations can check their locally running Docker services to identify any unwanted resources sharing the system. If any are found, a thorough investigation should be conducted to determine how the script was uploaded and run, followed by a comprehensive clean-up.

A unique aspect of this attack is the use of the cURL tool, which can be used legitimately and could easily go unnoticed by most companies. However, in this case, it was the initial artifact that led the researchers to investigate further. This highlights the importance of isolating all unusual artifacts, not just those considered malicious.

Additionally, organizations should ensure their assets are up to date and apply patches to applications whenever available, particularly in cases where vulnerabilities have already been exploited. Users with deeper knowledge of computer security can also remain vigilant by monitoring running containers, detecting anomalies in network traffic, and regularly running vulnerability scans.

The discovery of this active proxyjacking campaign highlights the growing threat and need for awareness and mitigation. By understanding the attack vector and implementing appropriate defenses, organizations can better protect themselves from falling victim to these lucrative attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...