• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Qubitstrike attacks rootkit Jupyter Linux servers to steal credentials

Bill Toulas by Bill Toulas
October 18, 2023
Reading Time: 3 mins read
0
Qubitstrike attacks rootkit Jupyter Linux servers to steal credentials

Linux malware

RELATED POSTS

HTC Global Services confirms cyberattack after data leaked online

Multiple NFT collections at risk by flaw in open-source library

Kali Linux 2023.4 released with GNOME 45 and 15 new tools

Hackers are scanning for internet-exposed Jupyter Notebooks to breach servers and deploy a cocktail of malware consisting of a Linux rootkit, crypto miners, and password-stealing scripts.

Jupyter Notebooks are open-source interactive computing environments for data analysis, machine learning, and scientific research. This platform was recently targeted by another malware named ‘PyLoose,’ also leading to XMRRig miner deployment in the underlying container.

In a new campaign called ‘Qubitstrike,’ the threat actors download malicious payloads to hijack a Linux server for cryptomining and to steal credentials for cloud services, such as AWS and Google Cloud.

As Cado Research reports today, the Qubitstrike malware payloads are hosted on codeberg.org, marking the first instance of this platform being abused for malware distribution.

Hijacking Linux with Qubitstrike

Qubitstrike attacks are believed to begin with a manual scan for exposed Jupyter Notebooks, followed by a CPU identification to evaluate its mining potential.

The attackers search for credential files they can steal and download and execute a script (‘mi.sh’) using a base64-encoded command.

Buy JNews
ADVERTISEMENT

The script is responsible for most of the malicious activity on a compromised Linux server, including the following:

  • Download and run an XMRig miner disguised as “python-dev”
  • Set up four cron jobs (apache2, apache2.2, netns, netns2) for the miner’s and script’s persistence
  • Insert an attacker-controlled SSH key for persistent root access
  • Install the ‘Diamorphine’ LKM (loadable kernel module) rootkit that helps hide specific processes from monitoring tools
  • Steal credentials from the breached endpoint and spread via SSH

Cado reports that mi.sh also performs some attack-optimization steps using an additional component named “kthreadd,” such as detecting competing miners in the list of running processes and killing them and using the ‘netstat’ utility to shut connections to IPs flagged for cryptojacking.

To cover the attacker’s traces, data transfer utilities such as ‘curl’ and ‘wget’ are renamed, and log files containing evidence of the breach are wiped from the system using a custom function (‘log_f’).

The Qubitstrike scripts also install the open-source Diamorphine rootkit for Linux, which is used to hide the presence of any running scripts and malware payloads.

“Diamorphine is well-known in Linux malware circles, with the rootkit being observed in campaigns from TeamTNT and, more recently, Kiss-a-dog,” explains the Cado report.

“Compiling the malware on delivery is common and is used to evade EDRs and other detection mechanisms.”

Credential stealing

Qubitstrike searches for credentials on the compromised endpoint and sends them back to its operators using the Telegram Bot API.

Specifically, the malware iterates through a list of 23 directories that usually host credentials for files named “credentials,” “cloud,” “kyber-env,” and others.

Any credentials found there are stored in a temporary file on “/tmp/creds,” sent to the Telegram bot, and eventually deleted.

Attacker's attempt to use the stolen AWS credentials
Attacker’s attempt to use the stolen AWS credentials (Cado)

Cado has found that the bot linked to the credentials exfiltration is linked to a private chat with a user named “z4r0u1.” Also, the researchers found that the attacker’s IP address places them in Tunisia, while the user agent shows the use of Kali Linux.

Threat actor's profile on Telegram
Threat actor’s profile on Telegram (Cado)

Using Discord as a C2

Examining the attacker’s repository on Codeberg revealed another script named ‘kdfs.py,’ which utilizes a Discord bot for command and control (C2) operations using a multi-obfuscated token.

The script can run as a standalone executable, messaging a hard-coded Discord channel to send host info and then waiting for commands to execute. The implant also abuses Discord for data exfiltration.

The embedded token exposed the attacker’s nickname, ‘BlackSUN,’ Discord server, ‘NETShadow,’ and the contained channels named ‘victims’ and ‘ssh,’ which leave little doubt about the nature of the space, created on September 2, 2023.

Bot's output on the private Discord channel
Bot’s output on the private Discord channel (Cado)

Although the kdfs.py implant was never deployed on Cado’s honeypots, the researchers suggest it’s a predecessor to the mi.sh script.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

HTC Global Services confirms cyberattack after data leaked online
Cyber Security

HTC Global Services confirms cyberattack after data leaked online

December 5, 2023
Multiple NFT collections at risk by flaw in open-source library
Cyber Security

Multiple NFT collections at risk by flaw in open-source library

December 5, 2023
Kali Linux 2023.4 released with GNOME 45 and 15 new tools
Cyber Security

Kali Linux 2023.4 released with GNOME 45 and 15 new tools

December 5, 2023
Microsoft to let Windows 10 home users buy Extended Security Updates
Cyber Security

Microsoft to let Windows 10 home users buy Extended Security Updates

December 5, 2023
Microsoft to let Windows 10 home users buy Extended Security Updates
Cyber Security

Microsoft to let Windows 10 home users buy Extended Security Updates

December 5, 2023
Microsoft to let Windows 10 home users buy Extended Security Updates
Cyber Security

Microsoft to let Windows 10 home users buy Extended Security Updates

December 5, 2023

Recommended Stories

Google Chrome & Microsoft Edge to get ‘Save Frame’ feature for YouTube

Google Chrome & Microsoft Edge to get ‘Save Frame’ feature for YouTube

November 12, 2023
CAGA Crypto: Decentralized financial movement unveiled on MEXC and Bitget

CAGA Crypto: Decentralized financial movement unveiled on MEXC and Bitget

December 2, 2023
Deals: Get Apple’s M2 13-Inch MacBook Pro for Up to $150 Off, Starting at $1,149

Deals: Get Apple’s M2 13-Inch MacBook Pro for Up to $150 Off, Starting at $1,149

March 10, 2023

Popular Stories

  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • A Brief History of All the Women Who Have Won the Nobel Prize

    136 shares
    Share 54 Tweet 34
  • Will XRP make a comeback after the recent price decline? Data suggests…

    136 shares
    Share 54 Tweet 34
  • Gowalla returns to see if location-based networking is ready for its mainstream moment

    136 shares
    Share 54 Tweet 34
  • Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace with Israel

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Ethereum spot ETF race heats up: This cohort takes an interest
  • Of SHIB’s surging burn rate and BONE’s role in it all
  • Should Blur investors be concerned about the dip in prices?

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?