Go to listing page

Hackers Use Proxyjacking to Profit from Compromised SSH Servers' Bandwidth

Hackers Use Proxyjacking to Profit from Compromised SSH Servers' Bandwidth
The attackers were observed conducting a series of proxyjacking attacks aimed at hacking vulnerable SSH servers. They monetize them through proxyware services that provide compensation for the sharing of unused internet bandwidth. 

The attackers are leveraging SSH for remote access and executing malicious scripts to covertly enlist victim servers into a Peer-to-Peer (P2P) proxy network, such as Peer2Proxy or Honeygain.

Diving into details

On June 8, Akamai initially detected the attacks when numerous SSH connections were established with honeypots managed by it.
  • Upon successfully connecting to one of the vulnerable SSH servers, the attackers implemented a Bash script encoded in Base64. This script effectively incorporated the compromised systems into the proxy networks of Honeygain or Peer2Profit.
  • Additionally, the script established a container environment by downloading Docker images of proxy networks, while simultaneously terminating competing containers that shared bandwidth.
  • Further investigation revealed the presence of cryptocurrency miners, exploits, and hacking tools on the compromised server, indicating that the threat actors may have fully transitioned to proxyjacking or employed it as an additional means of generating passive income.

Why it matters

  • Proxyjacking has emerged as a fresh avenue for cybercriminals to generate profits from compromised devices, spanning both corporate and consumer ecosystems. 
  • This method offers a more covert alternative to cryptojacking and introduces significant implications that compound the challenges already posed by proxied Layer 7 attacks.

Notable attacks against SSH servers

  • Recently, Microsoft unveiled an ongoing cryptomining campaign that involves hijacking SSH credentials for vulnerable Linux and Windows systems.
  • Last month, ASEC researchers uncovered a campaign disseminating the Tsunami botnet on poorly managed SSH servers. Apart from Tsunami, the attackers distributed ShellBot, XMRig miner, and Log Cleaner to carry out DDoS and cryptomining attacks.

The bottom line

Even with the advent of new outcomes, traditional methods continue to demonstrate their effectiveness. Monetized proxyjacking serves as a prime illustration of this concept, and it is highly likely that we will witness the emergence of novel strategies specifically focused on this type of attack. Implementing standard security measures such as robust passwords, diligent patch management, and comprehensive logging is among the effective preventive measures.
Cyware Publisher

Publisher

Cyware