Trojan Transforms Linux Devices into Proxies for Malicious Traffic

KNOWLEDGE BELONGS TO THE WORLD
Share on FacebookTweet about this on TwitterShare on LinkedInShare on RedditShare on Google+Share on TumblrPin on PinterestDigg this

Security researchers have uncovered a new trojan that targets Linux devices that is capable of transforming infected machines into proxy servers and relay malicious traffic, hiding the true origin of attacks or other nefarious activities.

This new trojan is named Linux.Proxy.10 and its first versions were spotted online towards the end of the year.

According to Dr.Web, the security company who unmasked the trojan’s activities, by the end of January, there were thousands of devices infected with this threat.

Linux.Proxy used as a second-stage malware

What’s different about Linux.Proxy is that the trojan doesn’t include any features to infect and compromise devices.

According to researchers, the trojan’s operators use other trojans to compromise devices, which they use to create a user “mother” and the password “fucker.”

Once these accounts are created, they’re reported back to the crooks’ server, which saves them in a list.

List of IP-username-password entries found on the crooks' servers
List of IP-username-password entries found on the crooks’ servers (Source: Dr.Web)

Attackers parse this list, log into the affected devices via SSH, and download the Linux.Proxy malware on all machines.

Script used to download and install Linux.Proxy.10
Script used to download and install Linux.Proxy.10 (Source: Dr.Web)

Under the hood, the Linux.Proxy malware contains a copy of the Satanic Socks Server utility, which it will use to set up a local SOCKS5 proxy server on one of the following ports:

18902
27891
28910
33922
37912
39012
48944
49082
49098
56494
61092
61301

Linux.Proxy actors involved in other malware campaigns

According to Dr.Web, the same server where they found the list of devices with the mother:f***er username and password combos, also hosted the control panel of a SpyAgent computer monitoring software, along with a Windows build for the BackDoor.TeamViewer spyware.

Taking into account that the malware was found on thousands of devices, it’s very likely that the malware’s authors are using it to rent out access to their anonymizing network, and not just for masking their own malicious activities.

In the past, other Linux malware families that were used to transform infected hosts into proxy servers and relay malicious traffic include the likes of Moose, LuaBot and NyaDrop.

Attackers have also used a 12-year-old SSH bug (CVE-2004-1653) to compromise Linux-based IoT devices and use them in a similar manner to relay malicious traffic.

 Source:https://www.bleepingcomputer.com/
(Visited 131 times, 1 visits today)
KNOWLEDGE BELONGS TO THE WORLD
Share on FacebookTweet about this on TwitterShare on LinkedInShare on RedditShare on Google+Share on TumblrPin on PinterestDigg this