Illicit Cryptocurrency Mining via CVE-2023-22527: Analyzing a Comprehensive Cryptocurrency Mining Ecosystem

Illicit Cryptocurrency Mining via CVE-2023-22527: Analyzing a Comprehensive Cryptocurrency Mining Ecosystem | Trend Micro (US)

Material has been added to your Colle

Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem











Illicit Cryptocurrency Mining via CVE-2023-22527: Analyzing a Comprehensive Cryptocurrency Mining Ecosystem | Trend Micro (US)














Material has been added to your Collection




Figure 12. Sustaining control via cron

After ensuring the cessation or removal of all cloud monitoring and security services, the attacker ceases the initial attack vector exploiting CVE-2023-22527 and acquires the XMRig miner to commence the mining operations.



Figure 13. Downloading the mining configuration file and starting another shell (solr.sh) to commence mining operations

Before initializing mining activities, the attacker utilizes the solr.sh function to ensure the cessation of all security utilities absent in the prior shell.



Figure 14. The Attacker ceasing and erasing familiar security utilities and mining processes

Ultimately, as the final step in main rnv2ymcl, the attacker eliminates every trace by wiping out log and bash history.

Figure 15: Eliminating activities from the affected server

The subsequent image displays the wallet details compiled from the JSON file:

Figure 16. Wallet information from the JSON file

Given the persistent exploitation by malevolent actors, CVE-2023-22527 represents a substantial security jeopardy to enterprises worldwide. To mitigate the hazards and menaces linked with this vulnerability, administrators should expeditiously update their versions of Confluence Data Center and Confluence Server to the latest editions available.

Moreover, firms should contemplate incorporating the ensuing prime practices for broad vulnerability exploitation protection:

Patch Management: Routinely renovating and patching software, operating systems, and applications proves to be the most compelling technique to deter vulnerabilities from being exploited.

Network Segmentation: Segregating critical network sections from the larger network can diminish the repercussions of exploit-driven assaults.

Periodic Security Audits: Conducting security examinations and vulnerability scrutinies can unearth and rectify weaknesses in the infrastructure before they’re abused.

Response Plan for Incidents: Formulating, evaluating, and preserving an incident response blueprint aids organizations in promptly and adequately addressing security breaches and exploit endeavors.

Enforcing network-based access controls, utilizing breach prevention systems like Trend Vision One™, and executing regular vulnerability scans can further reinforce security.

Figure 17. Honeypot trigger 1 (top) and 2 (bottom)

Vision hunting inquiries

The ensuing textual content lists conceivably beneficial inquiries for threat hunting within Vision One:

Hunting SSH lateral movement exploiting dubious flags
eventSubId: 2 AND processCmd:ssh AND processCmd:oStrictHostKeyChecking AND processCmd:oBatchMode

Tracking malicious echo alterations orincluding new scheduled tasks
eventSubId: 2 AND (processCmd:cron OR objectCmd:cron) AND (processCmd:echo OR objectCmd:echo)

You can discover the indicators of compromise at this location.

MITRE ATT&CK

Tactic Technique Technique ID
Initial Access Exploit Public-Facing Application T1190
Execution Command and Scripting Interpreter: Unix Shell T1059.004
Defense Evasion Disable or Modify Tools T1562.001
Clear Command History T1070.003
Clear Linux or Mac System Logs T1070.002
Command and Control Ingress Tool Transfer T1105
Persistence Scheduled Task/Job: Cron T1053.003
Collection Data from Local System T1005
Impact Resource Hijacking T1496 

Tags

sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.