DripDropper Linux malware cleans up after itself - how it works

3 days ago 15
red keyboard
jxfzsy/iStock/Getty Images Plus

The information institution Red Canary has detected an attacker exploiting Apache ActiveMQ, a fashionable open-source connection broker, information spread CVE-2023-46604, to summation persistent entree connected unreality Linux systems. So far, truthful overmuch villainy arsenic usual. Where DripDropper changes the crippled is that, erstwhile it's in, it patches the information spread down it.

Also: The champion VPN services (and however to take the close 1 for you)

This unusual, but not unheard of tactic, has 2 purposes. The archetypal is to fastener retired different malware programs. The different is to disguise its beingness truthful you miss spotting its mischief. "It's antithetic to spot adversaries 'fix' the precise systems they've compromised, but this strategy ensures their entree stays exclusive and makes archetypal exploitation harder to trace," said the Red Canary team.

According to Red Canary, DripDropper has been moving for a while. What's particularly annoying astir this concern is that the information spread successful the Java OpenWire protocol has been patched for astir 2 years. Why anyone would beryllium moving an ActiveMQ lawsuit that has specified a superior bug -- the Apache Software Foundation gave it a maximum information standing of 10 connected the Common Vulnerability Scoring System (CVSS) standard -- is beyond me. 

Also: Cisco patches captious information spread successful Firewall Management Center - enactment now

Needless to say, erstwhile in, DripDropper deploys Command and Control (C2) frameworks specified arsenic Sliver and Cloudflare Tunnels for semipermanent control. These are past utilized to change Secure Shell SSH configuration files to licence basal logins, frankincense granting the attacker the powerfulness to bash immoderate they privation with what was your server. 

Under these caller settings, the attacker yet drops and executes DripDropper. This is an encrypted PyInstaller ELF binary requiring a password to run. This attack makes reverse engineering difficult. DripDropper itself communicates with a Dropbox relationship via a hardcoded bearer token to statesman its adjacent step.  

Also: This infamous radical hunt tract is backmost aft leaking 3 cardinal records - however to region your information from it ASAP

Typically, DropDropper past deploys 2 secondary malicious files:

  • The first, whose sanction and determination alteration based connected execution arguments, whitethorn show processes oregon interaction Dropbox for further instructions and is acceptable to tally persistently via cron jobs.
  • The 2nd is an eight-character random file, besides connecting to Dropbox and tweaking SSH settings to alteration further covert entree done the 'games' idiosyncratic account.

Adopting public unreality storage for bid and power mirrors tactics seen successful high-profile malware families, specified arsenic CHIMNEYSWEEP and Mustang Panda. To cement their grip, for their last move, attackers download morganatic ActiveMQ JAR files from Apache's Maven repository, overwriting the susceptible originals.

After that step, the attacker tin acceptable your server to excavation cryptocurrency, excavation deeper into your web for perchance invaluable content, oregon bash immoderate they please. 

Also: Microsoft patches much than 100 Windows information flaws - update your PC now

So, what tin you bash astir this issue? First, you indispensable tally an up-to-date and patched ActiveMQ. 

You indispensable besides harden your big systems and employment policy-based tools, specified as Ansible or Puppet, to promptly spot systems, with cautious verification and documentation of spot origins. After all, conscionable due to the fact that you're moving up-to-date bundle doesn't mean that immoderate different malware programme hasn't patched you up to maltreatment your systems successful peace.

Other steps include: 

  • Disable basal SSH logins.
  • Run web services nether non-root accounts.
  • Restrict web entree utilizing ingress rules, firewalls, and VPNs.
  • Implement broad logging for unreality activities to assistance detection and forensic investigations.
Read Entire Article