The Watchbog botnet, which uses the XMR-Stak Monero miner, has been observed being installed onto vulnerable systems by exploiting a Jenkins vulnerability, CVE-2018-1000861, and also attempts to spread laterally, according to a report from Cisco Talos. While the attackers take some small steps, such as using base64 encoding to obfuscate their malicious code, the attacks operate largely in the open. Typical of cryptomining malware, the installation script checks for the presence of other cryptomining tools and, if found, terminates them. The script also obtains configuration data from Pastebin URLs and installs a system-compatible version of the XMR-Stak miner from a Github URL. While the attackers leave a note on infected systems claiming they only wish to mine cryptocurrency, the fact that they attempt to move laterally and infect other systems tends to bely that. The lateral movement is attempted in two ways, the first being to use SSH, querying the systems known_hosts file, and checking for SSH keys which can be used to authenticate to the remote systems. The second is by scanning the victim’s subnet for open Jenkins and Redis ports. If found, an attempt will be made to exploit the system using the CVE-2018-1000861 vulnerability. If exploitation is successful in either of the cases, the process to infect the victim with the Watchbog malware will begin.
Exposure of sensitive information
Malware Hash (MD5/SHA1/SH256)