Ebury and Mayhem server malware families still active

Posted by   Martijn Grooten on   Oct 31, 2017

Whether it is to send spam or to redirect web traffic to malicious payloads, compromised (Linux) web servers are the glue in many a malware campaign. Two such networks of compromised servers – about which VB has published papers in the past – have recently received updates.

The paper 'Operation Windigo' (pdf) was published by ESET in 2014 and looked at a cybercrime operation that used various Linux malware families, including the Ebury OpenSSH backdoor, which was used to access servers and steal credentials, and the Cdorked HTTP backdoor, which was used for web traffic redirection.

At VB2014, researchers from ESET in Canada and Yandex in Russia shared the stage to present a paper on these malware families, and at the same event, the authors of the Operation Windigo paper were the winners of the first Péter Szőr award.

The work the ESET researchers did on this group wasn't merely technical though: they also assisted the FBI in an international operation against the conspirators behind the malware, which led to the arrest of one individual at the Finnish-Russian border in August 2015. The suspect was subsequently extradited to the United States where he pleaded guilty and was sentenced to 46 months in prison.

Despite this setback, the group is still active. Yesterday, ESET published a blog post highlighting various updates to the Ebury malware, which include self-hiding techniques and a domain generating algorithm (DGA) that signs DNS TXT records to mitigate possible attempts to sinkhole the botnet.

penguins_wikimedia_commons.jpg

Various generations of penguins. Source: Wikimedia commons.

Also in 2014, Virus Bulletin published a paper by the same group of Yandex researchers, on the Mayhem botnet they had discovered. What made this botnet of Linux servers particularly noteworthy was the fact that it operated under restricted privileges and thus didn't require root access on the infected machines. The clear separation of root and user accounts on Linux is often cited as a strong built-in defence against malware.

A blog post by Sucuri shows that the Mayhem botnet is still active and has updated itself, removing any traces of the MAYHEM_DEBUG server variable, while masquerading as a jquery library.

A combination of operating system hardening and security software for added protection has made both desktop and mobile operating systems more secure than ever. This has made Linux servers a relatively easy and rather attractive target for malware authors. It is thus unlikely that we have seen the end of such attacks.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Domestic Kitten: an Iranian surveillance program

At VB2019 in London, Check Point researchers Aseel Kayal and Lotem Finkelstein presented a paper detailing an Iranian operation they named 'Domestic Kitten' that used Android apps for targeted surveillance. Today we publish their paper and the video…

VB2019 video: Discretion in APT: recent APT attack on crypto exchange employees

At VB2019 in London, LINE's HeungSoo Kang explained how cryptocurrency exchanges had been attacked using Firefox zero-days. Today, we publish the video of his presentation.

VB2019 paper: DNS on fire

In a paper presented at VB2019, Cisco Talos researchers Warren Mercer and Paul Rascagneres looked at two recent attacks against DNS infrastructure: DNSpionage and Sea Turtle. Today we publish their paper and the recording of their presentation.

German Dridex spam campaign is unfashionably large

VB has analysed a malicious spam campaign targeting German-speaking users with obfuscated Excel malware that would likely download Dridex but that mostly stood out through its size.

Paper: Dexofuzzy: Android malware similarity clustering method using opcode sequence

We publish a paper by researchers from ESTsecurity in South Korea, who describe a fuzzy hashing algorithm for clustering Android malware datasets.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.