viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Hackers hammer SpringShell vulnerability in attempt to install cryptominers
Technology

Hackers hammer SpringShell vulnerability in attempt to install cryptominers

22/04/2022

Hackers hammer SpringShell vulnerability in attempt to install cryptominers

Getty Images

Malicious hackers have been hammering servers with attacks that exploit the recently discovered SpringShell vulnerability in an attempt to install cryptomining malware, researchers said.

SpringShell came to light late last month when a researcher demonstrated how it could be used to remotely execute malicious code on servers that run the Spring model-view-controller or WebFlux applications on top of Java Development Kit versions 9 or higher. Spring is the most widely used Java framework for developing enterprise-level applications in Java. The framework is part of a sprawling ecosystem that provides tools for things like cloud, data, and security apps.

Earlier this month, security firm Trend Micro said it began detecting attempts. From April 1 to April 12, company researchers detected an average of roughly 700 attempts per day to exploit the vulnerability to install cryptomining software. By running the malware on powerful enterprise servers, criminals can mine Bitcoin or other types of digital cash using the resources and electricity of an unwitting victim.

The number of exploit attempts peaked on April 3 at almost 3,000.

Trend Micro

The hackers first sent commands that were designed to discern if the vulnerable servers were running Windows or Linux. Then they ran exploit code that tried to install a type of interface known as a web shell, which allows a remote user to run commands using a Web-based window.

Advertisement

The URI corresponding to the encoded exploit looked like this, with the web shell being “zbc0fb.jsp” and parameters w and l standing for the Windows and Linux payloads, which are Base64-encoded.

/zbc0fb.jsp?w=powershell.exe+-NonI+-W+Hidden+-NoP+-Exec+Bypass+-Enc+ &l=echo+

A powershell script then tried to download the cryptocurrency miner and execute it. Trend redacted the script in the following snippet:

$cc="http://"
$sys=-join ([char[]](48..57+97..122) | Get-Random -Count (Get-Random (6..12)))
$dst="$env:AppData$sys.exe"

The execution flow looked like this:

1. The firewall is turned off using the netsh utility.

2. Other known cryptocurrency miners such as kthreaddi, sysrv, and sysrv012 are stopped or killed.

3. Other running processes listening on ports 3333, 4444, 5555, 7777, and 9000 are stopped.

4. If the process kthreaddk does not exist, the cryptocurrency miner downloads a binary, sys.exe, from 194[.]145[.]227[.]21 to C:Users\AppDataRoaming.exe.

5. The cryptocurrency miner then starts the process with a hidden window to avoid having the user observe visual hints of the process being executed.

6. A scheduled task with the name “BrowserUpdate” is created later, running every minute. In addition, the Windows run key is modified to run the binary sys.exe.

Trend Micro researchers don’t know how many, if any, of the exploit attempts were successful. Earlier this month, company researchers said they had also uncovered attempts to exploit SpringShell to install the Mirai botnet. Anyone running the Spring model-view-controller or WebFlux applications on the JDK version 9 or higher should patch the flaw as soon as practical.

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

Daily Crunch: Travis Kalanick is leaving Uber’s board – TechCrunch
Uber founder and former CEO Travis Kalanick is leaving the …

Uber founder Travis Kalanick is leaving the company’s board of directors – TechCrunch

Microsoft says yes to future encrypted DNS requests in Windows
Enlarge / Microsoft will (eventually) support secure DNS requests over …

Microsoft says yes to future encrypted DNS requests in Windows

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • PlayStation 5 gets Godfall looter-slasher from Gearbox Publishing
    Revenue train kept rolling all year long …
    28/12/2019
  • 2020 will be a big year for online childcare — here are 7 startups to watch
    Elon Musk just dropped an EDM track …
    31/01/2020
  • Google releases TyDi QA, a data set that aims to capture the uniqueness of languages
    Google releases TyDi QA, a data set …
    07/02/2020
  • Steam November top 20: Star Wars, Terminator, and Age of Empires II
    Star Wars Jedi: Fallen Order made EA …
    31/01/2020
  • Here are the five Startup Battlefield finalists at Disrupt Berlin – TechCrunch
    Here are the five Startup Battlefield finalists …
    12/12/2019

Popular Posts

  • 10 Shocking and Surprising Facts About the …
    25/06/2022 0
  • US college VPN credentials for sale on Russian crime forums, FBI says
    US college VPN credentials for sale on …
    27/05/2022 0
  • 10 Cheap Foods That Will Make You …
    28/05/2022 0
  • 10 Origin Stories of Favorite Classic Sitcoms …
    28/05/2022 0
  • Top 10 Historical Musicals That Aren’t “Hamilton” …
    29/05/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh