Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxy Jacking
Global Security

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxy Jacking

AdminBy AdminOctober 3, 2024No Comments3 Mins Read
Cryptocurrency Mining and Proxyjacking
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 3, 2024Ravi LakshmananLinux / Malware

Cryptocurrency Mining and Proxy Jacking

Linux servers are being targeted by an ongoing campaign that delivers stealthy malware called perfect with the main purpose of launching cryptocurrency miner and hacking software.

“Perfctl is particularly elusive and persistent, using several sophisticated techniques,” Aqua security researchers Assaf Morag and Idan Reviva said in a report shared with The Hacker News.

“When a new user logs into a server, they immediately stop all ‘noisy’ activity, lying dormant until the server is idle again. Once executed, it deletes the binary and continues to run quietly in the background as a service.”

It should be noted that some aspects of the campaign were opened last month, Cado Security, which detailed a campaign that targeted exposed instances of Selenium Grid on the Internet with both cryptocurrency mining software and proxy-jacking.

Specifically, the perfctl malware was found to exploit a security flaw in Polkit (CVE-2021-4043, also known as PwnKit) to elevate privileges to root and delete a miner called perfcc.

Cyber ​​security

The reason for the name “perfctl” appears to be a deliberate attempt to avoid detection and mix with legitimate system processes, as “perf” refers to the Linux performance monitoring tool and “ctl” refers to control in various command line tools such as systemctl, timedatectl and rabbitmqctl.

The chain of attacks observed by the cloud security company against its honeypot servers involves compromising Linux servers by using a vulnerable instance of Apache RocketMQ to deliver a payload called “httpd”.

Cryptocurrency mining and proxy jacking

Once executed, it copies itself to a new location in the “/tmp” directory, runs a new binary, terminates the original process, and deletes the original binary in an attempt to cover its tracks.

In addition to copying itself to other locations and giving itself seemingly innocuous names, the malware is designed to get rid of the rootkit to evade protection and the miner payload. Some cases also involve obtaining and executing the hacking software from a remote server.

To reduce the risk posed by perfctl, it is recommended to keep systems and all software up-to-date, limit file execution, disable unused services, ensure network segmentation, and implement role-based access control (RBAC) to limit access to critical files.

“To detect perfctl malware, you look for unusual spikes in CPU usage or system slowdowns when a rootkit has been deployed on your server,” the researchers said. “This could indicate crypto mining activity, especially during downtime.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.