Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Axiom Space is preparing for its fourth mission to the ISS

How to watch Apple’s WWDC 2025 Keynote

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Outlaw Group uses SSH Brute-Force to deploy Cryptojacking malware on Linux servers
Identity

Outlaw Group uses SSH Brute-Force to deploy Cryptojacking malware on Linux servers

userBy userApril 2, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 2, 2025Ravi LakshmananCrypto Jacking/Malware

Encrypt malware on Linux servers

Cybersecurity researchers are shedding light on the “automatic propagation” cryptocurrency mining botnet known as Outlaw (aka Dota), which is known for targeting illegally qualified SSH servers.

“Outlaw is a Linux malware that relies on SSH brute force attacks, cryptocurrency mining, and worm-like propagation to infect and maintain systems,” Elastic Security Lab said in a new analysis released Tuesday.

Outlaws are also the name given to the threat actors behind the malware. It is thought to be of Romanian origin. Other hacking groups that dominate the cryptojacking landscape include 8220, Keksec (aka Kek Security), Kinsing, and Teamtnt.

Hacking crews, which have been active since at least late 2018, are carrying out reconnaissance and abuse their scaffolding to maintain the persistence of compromised hosts by brute-enhancing their SSH servers and adding their own SSH keys to the “Authorized_Keys” file.

Cybersecurity

It is also known that attackers incorporate a multi-stage infection process that uses a dropper shell script (“TDDWRT7S.SH”) to download archive files (“dota3.tar.gz”).

A notable feature of malware is the initial access component (aka Blitz), which allows for self-propagation of malware in a botnet-like manner by scanning vulnerable systems running SSH services. The brute force module is configured to retrieve the target list from an SSH command and control (C2) server to further persist the cycle.

Encrypt malware on Linux servers

Several iterations of the attack also rely on leveraging Linux and UNIX-based operating systems that are susceptible to CVE-2016-8655 and CVE-2016-5195 (aka Dirty Cow). Once initial access is obtained, the malware uses the IRC channel to deploy a Shelbot for the remote control via the C2 server.

Cybersecurity

Shellbot allows you to execute any shell command, download and run additional payloads, launch DDOS attacks, steal credentials, and remove sensitive information.

As part of the mining process, you can determine the CPU of the infected system and the huge pages of all CPU cores can increase memory access efficiency. The malware also uses a binary called KSWAP01 to ensure persistent communication with the threat actor’s infrastructure.

“Even though they use basic technologies such as SSH brute enhancement, SSH keymanipulation and Cron-based persistence, outlaws are still active,” Elastic said. “The malware deploys a modified Xmrig miner, leverages C2’s IRC, and includes scripts that are published for persistence and defence evasion.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCase Study: Seamless Registration and Badge of Diabetes UK Specialist Conference
Next Article Ambitious joint infringement research to build reusable packaging systems
user
  • Website

Related Posts

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

June 8, 2025

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Axiom Space is preparing for its fourth mission to the ISS

How to watch Apple’s WWDC 2025 Keynote

In WWDC 25, AI must compensate with developers after AI shortage and lawsuits

New supply chain malware operations hit the NPM and PYPI ecosystems, targeting millions around the world

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Should the government ban AI-generated humans to stop the collapse of social trust?

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.