{"id":14078,"date":"2024-10-07T15:41:18","date_gmt":"2024-10-07T15:41:18","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=14078"},"modified":"2024-10-07T15:41:18","modified_gmt":"2024-10-07T15:41:18","slug":"stealthy-malware-has-infected-thousands-of-linux-systems-for-years","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=14078","title":{"rendered":"Stealthy Malware Has Infected Thousands of Linux Systems for Years"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">Different discussions embrace: <a data-offer-url=\"https:\/\/www.reddit.com\/r\/CentOS\/comments\/12ef76l\/need_help_in_removal_perfcc_and_perfctl_coin\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.reddit.com\/r\/CentOS\/comments\/12ef76l\/need_help_in_removal_perfcc_and_perfctl_coin\/&quot;}\" href=\"https:\/\/www.reddit.com\/r\/CentOS\/comments\/12ef76l\/need_help_in_removal_perfcc_and_perfctl_coin\/\" rel=\"nofollow noopener\" target=\"_blank\">Reddit<\/a>, <a data-offer-url=\"https:\/\/es.stackoverflow.com\/questions\/580957\/perfctl-usa-el-100-de-los-recursos-del-cpu\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/es.stackoverflow.com\/questions\/580957\/perfctl-usa-el-100-de-los-recursos-del-cpu&quot;}\" href=\"https:\/\/es.stackoverflow.com\/questions\/580957\/perfctl-usa-el-100-de-los-recursos-del-cpu\" rel=\"nofollow noopener\" target=\"_blank\">Stack Overflow<\/a> <a data-offer-url=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps&quot;}\" href=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" rel=\"nofollow noopener\" target=\"_blank\">(Spanish),<\/a> <a data-offer-url=\"https:\/\/forobeta.com\/temas\/como-eliminar-el-malware-perfctl-del-servidor-vps-ubuntu-20-04.961444\/?amp=1\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/forobeta.com\/temas\/como-eliminar-el-malware-perfctl-del-servidor-vps-ubuntu-20-04.961444\/?amp=1&quot;}\" href=\"https:\/\/forobeta.com\/temas\/como-eliminar-el-malware-perfctl-del-servidor-vps-ubuntu-20-04.961444\/?amp=1\" rel=\"nofollow noopener\" target=\"_blank\">forobeta<\/a> <a data-offer-url=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps&quot;}\" href=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" rel=\"nofollow noopener\" target=\"_blank\">(Spanish),<\/a> <a data-offer-url=\"https:\/\/community.brainycp.com\/viewtopic.php?t=5264\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/community.brainycp.com\/viewtopic.php?t=5264&quot;}\" href=\"https:\/\/community.brainycp.com\/viewtopic.php?t=5264\" rel=\"nofollow noopener\" target=\"_blank\">brainycp<\/a> <a data-offer-url=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps&quot;}\" href=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" rel=\"nofollow noopener\" target=\"_blank\">(Russian),<\/a> <a data-offer-url=\"https:\/\/www.natanetwork.com\/portal\/knowledgebase\/383\/Menghapus-maleware-perfctl-di-VPS-Linux.html?language=english\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.natanetwork.com\/portal\/knowledgebase\/383\/Menghapus-maleware-perfctl-di-VPS-Linux.html?language=english&quot;}\" href=\"https:\/\/www.natanetwork.com\/portal\/knowledgebase\/383\/Menghapus-maleware-perfctl-di-VPS-Linux.html?language=english\" rel=\"nofollow noopener\" target=\"_blank\">natnetwork<\/a> <a data-offer-url=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps&quot;}\" href=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" rel=\"nofollow noopener\" target=\"_blank\">(Indonesian),<\/a> <a data-offer-url=\"https:\/\/forum.proxmox.com\/threads\/cpu-auslastung-bei-100-trotz-niedriger-last.125196\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/forum.proxmox.com\/threads\/cpu-auslastung-bei-100-trotz-niedriger-last.125196\/&quot;}\" href=\"https:\/\/forum.proxmox.com\/threads\/cpu-auslastung-bei-100-trotz-niedriger-last.125196\/\" rel=\"nofollow noopener\" target=\"_blank\">Proxmox<\/a> <a data-offer-url=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps&quot;}\" href=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" rel=\"nofollow noopener\" target=\"_blank\">(Deutsch),<\/a> <a data-offer-url=\"https:\/\/blog.camel2243.com\/posts\/security-perfctl-malware-cpu-memory\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.camel2243.com\/posts\/security-perfctl-malware-cpu-memory\/&quot;}\" href=\"https:\/\/blog.camel2243.com\/posts\/security-perfctl-malware-cpu-memory\/\" rel=\"nofollow noopener\" target=\"_blank\">Camel2243<\/a> <a data-offer-url=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps&quot;}\" href=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" rel=\"nofollow noopener\" target=\"_blank\">(Chinese),<\/a> <a data-offer-url=\"https:\/\/svrforum.com\/software\/1680420\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/svrforum.com\/software\/1680420&quot;}\" href=\"https:\/\/svrforum.com\/software\/1680420\" rel=\"nofollow noopener\" target=\"_blank\">svrforum<\/a> <a data-offer-url=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps&quot;}\" href=\"https:\/\/www.freelancer.com\/projects\/linux\/remove-perfctl-malware-from-vps\" rel=\"nofollow noopener\" target=\"_blank\">(Korean),<\/a> <a data-offer-url=\"https:\/\/support.exabytes.co.id\/en\/support\/solutions\/articles\/14000146571-guide-on-how-to-remove-perfctl-maleware-on-linux-vps\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.exabytes.co.id\/en\/support\/solutions\/articles\/14000146571-guide-on-how-to-remove-perfctl-maleware-on-linux-vps&quot;}\" href=\"https:\/\/support.exabytes.co.id\/en\/support\/solutions\/articles\/14000146571-guide-on-how-to-remove-perfctl-maleware-on-linux-vps\" rel=\"nofollow noopener\" target=\"_blank\">exabytes,<\/a> <a data-offer-url=\"https:\/\/forum.virtualmin.com\/t\/perfctl-uses-100-cpu-usage\/117873\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/forum.virtualmin.com\/t\/perfctl-uses-100-cpu-usage\/117873&quot;}\" href=\"https:\/\/forum.virtualmin.com\/t\/perfctl-uses-100-cpu-usage\/117873\" rel=\"nofollow noopener\" target=\"_blank\">virtualmin,<\/a> <a data-offer-url=\"https:\/\/serverfault.com\/questions\/1095192\/100-cpu-load-caused-by-service-perfctl\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/serverfault.com\/questions\/1095192\/100-cpu-load-caused-by-service-perfctl&quot;}\" href=\"https:\/\/serverfault.com\/questions\/1095192\/100-cpu-load-caused-by-service-perfctl\" rel=\"nofollow noopener\" target=\"_blank\">serverfault<\/a> <a data-offer-url=\"https:\/\/forum.virtualmin.com\/t\/perfctl-uses-100-cpu-usage\/117873\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/forum.virtualmin.com\/t\/perfctl-uses-100-cpu-usage\/117873&quot;}\" href=\"https:\/\/forum.virtualmin.com\/t\/perfctl-uses-100-cpu-usage\/117873\" rel=\"nofollow noopener\" target=\"_blank\">and many others.<\/a><\/p>\n<p class=\"paywall\">After exploiting a vulnerability or misconfiguration, the exploit code downloads the primary payload from a server, which, typically, has been hacked by the attacker and transformed right into a channel for distributing the malware anonymously. An assault that focused the researchers\u2019 honeypot named the payload httpd. As soon as executed, the file copies itself from reminiscence to a brand new location within the \/temp listing, runs it, after which terminates the unique course of and deletes the downloaded binary.<\/p>\n<p class=\"paywall\">As soon as moved to the \/tmp listing, the file executes below a special title, which mimics the title of a recognized Linux course of. The file hosted on the honeypot was named sh. From there, the file establishes a neighborhood command-and-control course of and makes an attempt to realize root system rights by exploiting CVE-2021-4043, a privilege-escalation vulnerability that was patched in 2021 in Gpac, a broadly used open supply multimedia framework.<\/p>\n<p class=\"paywall\">The malware goes on to repeat itself from reminiscence to a handful of different disk areas, as soon as once more utilizing names that seem as routine system recordsdata. The malware then drops a rootkit, a number of common Linux utilities which were modified to function rootkits, and the miner. In some instances, the malware additionally installs software program for \u201cproxy-jacking,\u201d the time period for surreptitiously routing visitors by the contaminated machine so the true origin of the info isn\u2019t revealed.<\/p>\n<p class=\"paywall\">The researchers continued:<\/p>\n<blockquote class=\"BlockquoteEmbedWrapper-sc-SdiGL gzzTVu paywall blockquote-embed\">\n<div class=\"BlockquoteEmbedContent-esRbGs dqgvoS blockquote-embed__content\">\n<p>As a part of its command-and-control operation, the malware opens a Unix socket, creates two directories below the \/tmp listing, and shops information there that influences its operation. This information consists of host occasions, areas of the copies of itself, course of names, communication logs, tokens, and extra log info. Moreover, the malware makes use of setting variables to retailer information that additional impacts its execution and conduct.<\/p>\n<p>All of the binaries are packed, stripped, and encrypted, indicating vital efforts to bypass protection mechanisms and hinder reverse engineering makes an attempt. The malware additionally makes use of superior evasion methods, akin to suspending its exercise when it detects a brand new consumer within the btmp or utmp recordsdata and terminating any competing malware to keep up management over the contaminated system.<\/p>\n<\/div>\n<\/blockquote>\n<p class=\"paywall\">By extrapolating information such because the variety of Linux servers linked to the web throughout varied providers and functions, as tracked by providers akin to Shodan and Censys, the researchers estimate that the variety of machines contaminated by Perfctl is measured within the 1000&#8217;s. They are saying that the pool of susceptible machines\u2014which means those who have but to put in the patch for CVE-2023-33426 or comprise a susceptible misconfiguration\u2014is within the hundreds of thousands. The researchers have but to measure the quantity of cryptocurrency the malicious miners have generated.<\/p>\n<p class=\"paywall\">Individuals who wish to decide if their system has been focused or contaminated by Perfctl ought to search for indicators of compromise included in <a data-offer-url=\"https:\/\/www.aquasec.com\/blog\/perfctl-a-stealthy-malware-targeting-millions-of-linux-servers\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.aquasec.com\/blog\/perfctl-a-stealthy-malware-targeting-millions-of-linux-servers\/&quot;}\" href=\"https:\/\/www.aquasec.com\/blog\/perfctl-a-stealthy-malware-targeting-millions-of-linux-servers\/\" rel=\"nofollow noopener\" target=\"_blank\">Thursday\u2019s post<\/a>. They need to even be looking out for uncommon spikes in CPU utilization or sudden system slowdowns, notably in the event that they happen throughout idle occasions. Thursday\u2019s report additionally supplies steps for stopping infections within the first place.<\/p>\n<p class=\"paywall\"><em>This story initially appeared on<\/em> <em><a href=\"https:\/\/arstechnica.com\/security\/2024\/10\/persistent-stealthy-linux-malware-has-infected-thousands-since-2021\/?itm_source=parsely-api\">Ars Technica<\/a>.<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/perfctl-stealthy-malware-infected-linux-systems\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Different discussions embrace: Reddit, Stack Overflow (Spanish), forobeta (Spanish), brainycp (Russian), natnetwork (Indonesian), Proxmox (Deutsch), Camel2243 (Chinese), svrforum (Korean), exabytes, virtualmin, serverfault and many others. After exploiting a vulnerability or misconfiguration, the exploit code downloads the primary payload from a server, which, typically, has been hacked by the attacker and transformed right into a channel [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14080,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[4793,10837,3555,10836,2166,709,1049],"class_list":["post-14078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-infected","tag-linux","tag-malware","tag-stealthy","tag-systems","tag-thousands","tag-years"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/14078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14078"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/14078\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/14080"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}