• Contact Us
  • Privacy Policy
Thursday, January 21, 2021
NewzTech.net
  • Home
  • Technology
  • Gadgets
  • Security
  • AI
  • Military
  • Deals
No Result
View All Result
  • Home
  • Technology
  • Gadgets
  • Security
  • AI
  • Military
  • Deals
No Result
View All Result
NewzTech.net
No Result
View All Result

Stantinko Botnet Now Targeting Linux Servers to Hide Behind Proxies

November 24, 2020
in Security
4 min read
Stantinko Botnet Now Targeting Linux Servers to Hide Behind Proxies
0
SHARES
1
VIEWS
ShareShareShareShareShare

An adware and coin-miner botnet targeting Russia, Ukraine, Belarus, and Kazakhstan at least since 2012 has now set its sights on Linux servers to fly under the radar.

According to a new analysis published by Intezer today and shared with The Hacker News, the trojan masquerades as HTTPd, a commonly used program on Linux servers, and is a new version of the malware belonging to a threat actor tracked as Stantinko.

Back in 2017, ESET researchers detailed a massive adware botnet that works by tricking users looking for pirated software into downloading malicious executables disguised as torrents to install rogue browser extensions that perform ad injection and click fraud.

The covert campaign, which controls a vast army of half a million bots, has since received a substantial upgrade in the form of a crypto-mining module with an aim to profit from computers under their control.

Although Stantinko has been traditionally a Windows malware, the expansion in their toolset to target Linux didn’t go unnoticed, with ESET observing a Linux trojan proxy deployed via malicious binaries on compromised servers.

Intezer’s latest research offers fresh insight into this Linux proxy, specifically a newer version (v2.17) of the same malware (v1.2) called “httpd,” with one sample of the malware uploaded to VirusTotal on November 7 from Russia.

Upon execution, “httpd” validates a configuration file located in “etc/pd.d/proxy.conf” that’s delivered along with the malware, following it up by creating a socket and a listener to accept connections from what the researchers believe are other infected systems.

An HTTP Post request from an infected client paves the way for the proxy to pass on the request to an attacker-controlled server, which then responds with an appropriate payload that’s forwarded by the proxy back to the client.

In the event a non-infected client sends an HTTP Get request to the compromised server, an HTTP 301 redirect to a preconfigured URL specified in the configuration file is sent back.

Stating that the new version of the malware only functions as a proxy, Intezer researchers said the new variant shares several function names with the old version and that some hardcoded paths bear similarities to previous Stantinko campaigns.

“Stantinko is the latest malware targeting Linux servers to fly under the radar, alongside threats such as ​Doki​, ​IPStorm​ and ​RansomEXX​,” the firm said. “We think this malware is part of a broader campaign that takes advantage of compromised Linux servers.”


Credit: Source link

ShareTweetSendSharePin
Previous Post

Huckberry x Mystery Ranch 2-Day Assault Collaboration

Next Post

Fortnite’s Crew subscription is built for the battle royale superfan

Related Posts

MrbMiner Crypto-Mining Malware Links to Iranian Software Company
Security

MrbMiner Crypto-Mining Malware Links to Iranian Software Company

January 21, 2021
Here’s How SolarWinds Hackers Stayed Undetected for Long Enough
Security

Here’s How SolarWinds Hackers Stayed Undetected for Long Enough

January 21, 2021
Hackers Accidentally Expose Passwords Stolen From Businesses On the Internet
Security

Hackers Accidentally Expose Passwords Stolen From Businesses On the Internet

January 21, 2021
Google Details Patched Bugs in Signal, FB Messenger, JioChat Apps
Security

Google Details Patched Bugs in Signal, FB Messenger, JioChat Apps

January 20, 2021
Load More
Next Post
Fortnite’s Crew subscription is built for the battle royale superfan

Fortnite's Crew subscription is built for the battle royale superfan

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

News Updates

US Army Micro-Atomizer Contributes to COVID-19 Research

US Army Micro-Atomizer Contributes to COVID-19 Research

January 18, 2021
Princeton Tec – BYTE Tactical

Princeton Tec – BYTE Tactical

January 18, 2021
Silynx Fortis – Soldier Systems Daily

Silynx Fortis – Soldier Systems Daily

January 17, 2021
Apple is once again extending TV+ free trials

Apple is once again extending TV+ free trials

January 15, 2021
LG says it might quit the smartphone market

LG says it might quit the smartphone market

January 20, 2021
ADVERTISEMENT
NewzTech.net

This is a news portal that aims to share latest news about technology, gadgets, security, AI, military and much more stuff like that. Feel free to get in touch with us!

What’s New Here!

Resident Evil VIII gets May release date, massive preview, playable demo

Resident Evil VIII gets May release date, massive preview, playable demo

January 21, 2021
‘Re:Verse’ lets you play as your favorite Resident Evil character online

‘Re:Verse’ lets you play as your favorite Resident Evil character online

January 21, 2021

Subscribe Now

Loading

© 2020 newztech.net - All rights reserved!

No Result
View All Result
  • Home
  • Technology
  • Gadgets
  • Security
  • AI
  • Military
  • Deals

© 2020 newztech.net - All rights reserved!