Linux Users Beware -- The Spinning YARN malware campaign targets misconfigured servers running Apache Hadoop YARN, Docker, Confluence, and Redis web-facing services. Cado Security Labs has discovered an emerging Linux malware campaign dubbed Spinning Yarn.
The emergence of the new Linux malware shouldn’t surprise, given the recent surge in threats targeting Linux devices and servers. Recently, an old Linux malware known as Bifrost RAT[1] resurfaced with a new variant that mimics VMware domains.[2]
According to Cado Security’s research, which was shared with Hackread.com ahead of its publication on Wednesday, Spinning Yarn is a malicious campaign that exploits weaknesses in popular Linux software used by businesses across various sectors.
These services are crucial components in organizations’ IT infrastructure. Docker is critical for developing, deploying, and managing containerized applications. Apache Hadoop allows distributed processing of large datasets. Redis, a widely used in-memory data store, helps in caching real-time applications, and Confluence allows collaboration and knowledge management.[3] By compromising these applications, attackers can gain unauthorized access to systems, steal sensitive data, disrupt operations, or deploy ransomware, posing a significant threat to servers and critical infrastructure.
In Spinning Yarn, threat actors have used several unique payloads, including four Golang binaries that automate the discovery and infection of hosts and let them exploit code. They use Confluence to exploit common misconfigurations and vulnerabilities, launch Remote Code Execution (RCE) attacks, and infect new hosts.
The attackers exploit CVE-2022-26134, an n-day vulnerability in Confluence, and deploy a container for the Docker compromise. The vulnerability has been exploited since 2022, including by Mirai malware variant V3G4 against IoT devices for DDoS attacks.[4]
Further probing revealed a series of shell scripts and standard Linux attack techniques used to deliver a cryptocurrency miner, spawn a reverse shell, and enable persistent access to compromised hosts. They also deploy an instance of the Platypus open-source reverse shell utility to maintain access.
Multiple user-mode rootkits are deployed to evade detection. Researchers observed that the shell script payloads employed in this campaign share similarities with those used in previous cloud attacks.
In their blog post, Cado Security Labs[5] detailed initial access activity on a docker Engine API honeypot on this IP address: 47966971. The attacker spawned a new Alpine Linux container and created a bind mount for the underlying server’s root directory. This technique is common in Docker attacks, allowing attackers to write files to the host and execute a job for the Cron scheduler, eventually achieving RCE.[6]
In this campaign, the attacker wrote an executable and registered a Cron job to execute base64-encoded shell commands. Such extensive attacks on Linux applications demonstrate attackers’ growing sophistication in targeting web-facing services in cloud environments and keeping abreast of vulnerabilities.
To mitigate the risks from campaigns like Spinning Yarn, regularly update software, enable strong passwords, educate employees on cybersecurity best practices, segment your network to limit potential damage, and deploy security solutions like endpoint security solutions and firewalls to detect and prevent malware infections. This will help protect against known vulnerabilities and ensure a secure environment.
RELATED TOPICS
New Linux Malware “Migo” Exploits Redis for Cryptojacking
Free Download Manager Site Pushed Linux Password Stealer
Malicious Ads Infiltrate Bing AI Chatbot in Malvertising Attack
Hamas Hackers Hit Israelis with New BiBi-Linux Wiper Malware
Mirai-based NoaBot Botnet Hits Linux Systems with Cryptominer
This HackRead article is shared at no charge for educational and informational purposes only.
Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@redskyalliance.com
- Reporting: https://www.redskyalliance.org/
- Website: https://www.redskyalliance.com/
- LinkedIn: https://www.linkedin.com/company/64265941
Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://attendee.gotowebinar.com/register/5993554863383553632
[1] https://www.hackread.com/bifrost-variant-linux-mimics-vmware-domain/
[2] https://www.hackread.com/new-linux-malware-alert-spinning-yarn-docker-apps/#google_vignette
[3] https://www.hackread.com/linux-malware-migo-exploits-redis-cryptojacking/
[4] https://www.hackread.com/mirai-variant-v3g4-ddos-attacks/
[5] https://www.cadosecurity.com/spinning-yarn-a-new-linux-malware-campaign-targets-docker-apache-hadoop-redis-and-confluence/
[6] https://www.hackread.com/ddostf-botnet-ddos-attacks-mysql-docker-hosts/
Comments