Latest Gafgyt Botnet Variation Aims at Vulnerable SSH Passwords for GPU Crypto Mining

Aug 15, 2024Ravie LakshmananNetwork Security / Cybercrime

Cyber experts have come across a fresh iteration of the Gafgyt botnet that targets devices with feeble SSH passcodes to engage in cryptocurrency mining through their GPU computing power.

New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining

Aug 15, 2024Ravie LakshmananNetwork Security / Cybercrime

New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining

Cyber experts have come across a fresh iteration of the Gafgyt botnet that targets devices with feeble SSH passcodes to engage in cryptocurrency mining through their GPU computing power.

Aqua Security researcher Assaf Morag mentioned in an analysis on Wednesday that this reveals the botnet is now focusing on more durable servers found in cloud-native environments.

Having been operational since 2014 in the wild, Gafgyt (also known as BASHLITE, Lizkebab, and Torlus) has a track record of exploiting feeble or default credentials to assume control over gadgets like routers, cameras, and DVRs. It can also utilize known security vulnerabilities in devices from Dasan, Huawei, Realtek, SonicWall, and Zyxel.

Cybersecurity

The compromised devices join a botnet capable of initiating distributed denial-of-service (DDoS) assaults against selected targets. There are indications that Gafgyt and Necro are managed by a threat faction known as Keksec, also recognized as Kek Security and FreakOut.

Botnets like Gafgyt are consistently evolving to introduce new functionalities, with 2021 witnessing variants that employed the TOR network to cloak malevolent operations and integrated certain modules from the leaked Mirai source code. It’s important to note that Gafgyt’s source code was leaked online in early 2015, leading to the emergence of new versions and modifications.

Gafgyt Botnet Variant

The recent attack procedures entail cracking SSH servers with weak passcodes to deploy subsequent payloads that assist in executing a cryptocurrency mining operation via “systemd-net.” This occurs after eradicating any competing malware already present on the enslaved host.

Furthermore, it initiates a worming tool called ld-musl-x86, a Go-based SSH scanner, to identify poorly protected servers on the web and disseminate the infection to additional systems, thereby expanding the botnet’s reach. This includes credentials for SSH, Telnet, and gaming servers and cloud platforms like AWS, Azure, and Hadoop.

Cybersecurity

“The cryptominer employed is XMRig, which is a Monero cryptocurrency miner,” Morag explained. “However, in this scenario, the threat actor aims to run a cryptominer using the –opencl and –cuda flags, which harness the computing power of GPU and Nvidia GPU.”

“The primary focus of the threat actor is on cryptocurrency mining rather than launching DDoS attacks, which distinguishes this variant from its predecessors. Its aim is to infiltrate cloud-native environments boasting strong CPU and GPU capabilities.”

Data retrieved from Shodan queries reveals more than 30 million openly available SSH servers, emphasizing the necessity for users to fortify their instances against brute-force attacks and potential exploitations.

Enjoyed this write-up? Join us on Twitter and LinkedIn for more exclusive articles.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.