Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CRYSTALRAY hackers infected more than 1,500 victims using a network mapping tool
Global Security

CRYSTALRAY hackers infected more than 1,500 victims using a network mapping tool

AdminBy AdminJuly 15, 2024No Comments2 Mins Read
Network Mapping Tool
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 15, 2024Information hallSaaS Security / Vulnerability

Network Mapping Tool

The threat actor, which was previously observed using an open-source network mapping tool, has expanded its operations significantly, infecting more than 1,500 victims.

Sysdig monitoring the cluster named CRYSTALsaid activity has seen a 10-fold spike, adding that it includes “mass scanning, exploiting multiple vulnerabilities and deploying backdoors using multiple security tools (open source software).”

The main purpose of the attacks is to collect and sell credentials, deploy cryptocurrency miners, and maintain stability in the victim’s environment.

Cyber ​​security

Among the open source programs used by the threat actor, it occupies a large place SSH-Snakewhich was first released in January 2024. It was described as a tool for automatic network traversal using private SSH keys discovered on systems.

CRYSTALRAY abused the software documented by the cybersecurity company earlier this February with the tool deployed for lateral movement after exploiting known security flaws in public instances of Apache ActiveMQ and Atlassian Confluence.

Joshua Rogers, the developer of SSH-Snake, told The Hacker News at the time that the tool only automates what would otherwise be a manual step, and urged companies to “discover the attack paths that exist and fix them.”

Network Mapping Tool

Some of the other tools used by attackers include base, map, httpxand nuclei to check if the domain is active and run a scan for vulnerable services such as Apache ActiveMQ, Apache RocketMQ, Atlassian Confluence, Laravel, Metabase, Openfire, Oracle WebLogic Server, and Solr.

Cyber ​​security

CRYSTALRAY also uses its native database to perform an extensive credential discovery process that goes beyond traversing between servers accessible via SSH. Permanent access to the compromised environment is achieved through a legitimate command and control (C2) system called A scrap and a reverse shell manager under the code name Duckbills.

In a further attempt to extract monetary value from the infected assets, cryptocurrency miner payloads are delivered to illegally exploit the victim’s resources for financial gain, while taking steps to shut down rival miners that may already be running on the machines.

“CRYSTALRAY is capable of discovering and extracting credentials from vulnerable systems that are then sold on black markets for thousands of dollars,” said Sysdig researcher Miguel Hernandez. “Accounts being sold include a variety of services, including cloud service providers and SaaS email providers.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.