Cryptomining campaign pulls new 'Linux Rabbit' malware out of its black hat

News by Bradley Barth

A two-month Monero cryptomining campaign targeted both Linux-based servers and Internet of Things devices with a newly discovered malware family called "Linux Rabbit," researchers have reported.

A two-month Monero cryptomining campaign targeted both Linux-based servers and Internet of Things devices with a newly discovered malware family called "Linux Rabbit," researchers have reported.

The operation occurred in two phases, each of which used a distinct version of Linux Rabbit that shares the same code base as the other iteration, according to a 6 December blog post from Anomali Labs.

The first phase commenced in August 2018 and involved the original Linux Rabbit malware, which was coded to infect Linux-based servers in Russia, South Korea, the UK, and the US The second lasted from September through October and used a self-propagating worm variant of Linux Rabbit known as Rabbot. Rabbot was developed to infect servers across a wider geographic range while also adding Linux-based IoT devices to its target list.

The Linux Rabbit family’s final payload is the CNRig miner if the infected device is an x86-bit Intel machine, and the Coinhive miner if the host runs on an ARM processor or MIPS architecture. Additionally, the malware injects Coinhive script tags into all of the web server’s HTML files, so that users who visit the server or its website also become infected.

According to Anomali, Linux Rabbit uses Tor hidden services and gateways to communicate with its malicious C2 server. "The payload for the malware is then sent from the C2 server as an encoded URL parameter," the blog post explains.

The malware next establishes persistence via "rc.local" files and ".bashrc" files, then employs brute-force techniques to steal SSH passwords that will allow Linux Rabbit to install the miner. Other functionalities include receiving malware updates from GitHub, detecting and deleting other miners that were previously installed on machines, and activating a kill switch.

The Rabbot variant is able to go after IoT devices as well because it can exploit a range of old vulnerabilities, including two critical code execution bugs that were found jsut this year in NUUO’s NVRMini2 firmware (CVE-2018-1149) and the SonicWall Global Management System (CVE-2018-9866).

This article was originally published on SC Media US.

Find this article useful?

Get more great articles like this in your inbox every lunchtime

Upcoming Events