Tuesday, June 24, 2025
  • Login
Whats Current In
Advertisement
  • Cyber Security
No Result
View All Result
  • Cyber Security
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

CRYSTALRAY hacker expands to 1,500 breached systems using SSH-Snake tool

wcisrvadm by wcisrvadm
July 11, 2024
in Cyber Security
0
CRYSTALRAY hacker expands to 1,500 breached systems using SSH-Snake tool
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

This post was originally published on this site

Crystalray hacker
Image: Midjourney

A new threat actor known as CRYSTALRAY has significantly broadened its targeting scope with new tactics and exploits, now counting over 1,500 victims whose credentials were stolen and cryptominers deployed.

This is being reported by researchers at Sysdig, who have tracked the threat actor since February, when they first reported their use of the SSH-Snake open-source worm to spread laterally on breached networks.

SSH-snake is an open-source worm that steals SSH private keys on compromised servers and uses them to move laterally to other servers while dropping additional payloads on breached systems.

Previously, Sysdig identified roughly 100 CRYSTALRAY victims impacted by the SSH-Snake attacks and highlighted the network mapping tool’s capabilities to steal private keys and facilitate stealthy lateral network movement.

Biting harder

Sysdig reports that the threat actor behind these attacks, now tracked as CRYSTALRAY, has significantly scaled up their operations, counting 1,500 victims.

“The team’s latest observations show that CRYSTALRAY’s operations have scaled 10x to over 1,500 victims and now include mass scanning, exploiting multiple vulnerabilities, and placing backdoors using multiple OSS security tools,” reads Sysdig’s report.

“CRYSTALRAY’s motivations are to collect and sell credentials, deploy cryptominers, and maintain persistence in victim environments. Some of the OSS tools the threat actor is leveraging include zmap, asn, httpx, nuclei, platypus, and SSH-Snake.”

Overview of CRYSTALRAY attacks
Overview of CRYSTALRAY attacks
Source: Sysdig

Sysdig says CRYSTALRAY uses modified proof-of-concept (PoC) exploits delivered to targets using the Sliver post-exploitation toolkit, providing another example of misuse of open-source tooling.

Before launching the exploits, the attackers conduct thorough checks to confirm the flaws discovered through nuclei.

The vulnerabilities CRYSTALRAY targets in its current operations are:

  • CVE-2022-44877: Arbitrary command execution flaw in Control Web Panel (CWP)
  • CVE-2021-3129: Arbitrary code execution bug impacting Ignition (Laravel).
  • CVE-2019-18394: Server-side request forgery (SSRF) vulnerability in Ignite Realtime Openfire

Sysdig says Atlassian Confluence products are likely targeted, too, based on the observed exploitation patterns that emerge from attempts against 1,800 IPs, one-third of which are in the U.S.

CRYSTALRAY uses the Platypus web-based manager to handle multiple reverse shell sessions on the breached systems. At the same time, SSH-Snake continues to be the primary tool by which propagation through compromised networks is achieved.

SSH-Snake recovering SSH keys
SSH-Snake recovering SSH keys
Source: Sysdig

Once SSH keys are retrieved, the SSH-Snake worm uses them to log into new systems, copy itself, and repeat the process on the new hosts.

SSH-Snake not only spreads the infection but also sends captured keys and bash histories back to CRYSTALRAY’s command and control (C2) server, providing options for greater attack versatility.

SSH-Snake propagation
SSH-Snake propagation
Source: Sysdig

Monetizing stolen data

CRYSTALRAY aims to steal credentials stored in configuration files and environment variables using scripts that automate the process.

Threat actors can sell stolen credentials for cloud services, email platforms, or other SaaS tools on the dark web or Telegram for good profit.

Additionally, CRYSTALRAY deploys cryptominers on the breached systems to generate revenue by hijacking the host’s processing power, with a script killing any existing cryptominers to maximize profit.

Mining activity associated with CRYSTALRAY operations
Mining activity associated with CRYSTALRAY operations
Source: Sysdig

Sysdig tracked some mining workers to a specific pool and discovered they were making roughly $200/month.

However, starting in April, CRYSTALRAY switched to a new configuration, making it impossible to determine its current revenue.

As the CRYSTALRAY threat grows, the best mitigation strategy is to minimize the attack surface through timely security updates to fix vulnerabilities as they are disclosed.


Previous Post

60 New Malicious Packages Uncovered in NuGet Supply Chain Attack

Next Post

Palo Alto Networks Patches Critical Flaw in Expedition Migration Tool

wcisrvadm

wcisrvadm

Next Post
Palo Alto Networks Patches Critical Flaw in Expedition Migration Tool

Palo Alto Networks Patches Critical Flaw in Expedition Migration Tool

Recent Posts

  • New FileFix attack weaponizes Windows File Explorer for stealthy commands
  • Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
  • How Today’s Pentest Models Compare and Why Continuous Wins
  • How the US Military Is Redefining Zero Trust
  • US House bans WhatsApp on staff devices over security concerns

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024

Categories

  • Cyber Security

Browse by Category

  • Cyber Security
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Cyber Security

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.