An aggressive and sophisticated malware campaign is currently underway, targeting Linux and Windows servers with an assortment of exploits with the goal of installing malware that mines the Monero cryptocurrency.
The campaign was detected by security researchers from F5 Networks, who named it Zealot, after zealot.zip, one of the files dropped on targeted servers.
According to Maxim Zavodchik and Liron Segal, two security researchers for F5 Networks, the attackers are scanning the Internet for particular servers and using two exploits, one for Apache Struts (CVE-2017-5638) and one for the DotNetNuke ASP.NET CMS (CVE-2017-9822), to get a foothold on unpatched machines.
The Apache Struts vulnerability is the same flaw that other hackers used earlier this year to breach US financial giant Equifax. In addition, a criminal group abused the same flaw in April to target Struts servers where they installed ransomware from which they made over $100,000 at the time.
For this campaign, the Struts flaw included payloads for targeting both Linux and Windows machines at the same time.
In the case attackers infected a Windows machine, attackers also deployed EternalBlue and EternalSynergy, two NSA exploits leaked by the Shadow Brokers earlier this year, which attackers use to move laterally in the victim’s local network and infect even more systems.
At a later point, they would use PowerShell to download and install the final-stage malware, which, for this campaign, was a Monero miner.
On Linux, attackers would use Python scripts that appear to be taken from the EmpireProject post-exploitation framework, and would also install the same Monero miner.
Submitted by: Arnfried Walbrecht