Malware, Threat Intelligence, Network Security

Additional details on Outlaw Linux cryptomining botnet emerge

botnet computer virus red background

Vulnerable SSH servers have been primarily targeted by the Outlaw Linux cryptocurrency mining botnet, also known as Dota, which could self-propagate through its BLITZ initial access component, The Hacker News reports.

Multi-stage attacks involving Outlaw, which is developed by a suspected Romanian threat operation under the same name, commence with SSH brute-forcing and proceed with dropper shell script distribution enabling the download of a miner-launching archive file that conceals previous compromise, according to an analysis from Elastic Security Labs. Misconfigured systems, including vulnerable Linux- and Unix-based systems impacted by the CVE-2016-8655 and CVE-2016-5195 flaws, have also been targeted by Outlaw in intrusions resulting in the deployment of SHELLBOT, which allows arbitrary shell command execution, distributed denial-of-service attacks, credential theft, and data exfiltration. "Outlaw remains active despite using basic techniques like SSH brute-forcing, SSH key manipulation, and cron-based persistence. The malware deploys modified XMRig miners, leverages IRC for C2, and includes publicly available scripts for persistence and defense evasion," said Elastic researchers.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds