Linux Servers being exploited by misconfigurations by perfctl malware

Aqua Security’s Nautilus Research Team today released research into the perfctl malware, which has leveraged 20K misconfigurations to exploit Linux servers and could impact millions of servers. 

In this blog post, Aqua Nautilus researchers aim to shed light on a Linux malware that, over the past 3-4 years, has actively sought more than 20,000 types of misconfigurations in order to target and exploit Linux servers. If you have a Linux server connected to the internet, you could be at risk. In fact, given the scale, we strongly believe the attackers targeted millions worldwide with a potential number of victims of thousands, it appears that with this malware any Linux server could be at risk.

We discovered numerous incident reports in community forums, all describing indicators of compromise linked to this malware. The community has widely referred to it as the “perfctl malware,” and we have adopted this name. 

This post will explore the malware’s architecture, components, defense evasion tactics, persistence mechanisms, and how we managed to detect it. Perfctl is particularly elusive and persistent, employing several sophisticated techniques, including: 

  • It utilizes rootkits to hide its presence. 
  • When a new user logs into the server, it immediately stops all “noisy” activities, lying dormant until the server is idle again. 
  • It utilizes Unix socket for internal communication and TOR for external communication. 
  • After execution, it deletes its binary and continues to run quietly in the background as a service. 
  • It copies itself from memory to various locations on the disk, using deceptive names. 
  • It opens a backdoor on the server and listens for TOR communications. 
  • It attempts to exploit the Polkit vulnerability (CVE-2021-4043) to escalate privileges. 

In all the attacks observed, the malware was used to run a cryptominer, and in some cases, we also detected the execution of proxy-jacking software. During one of our sandbox tests, the threat actor utilized one of the malware’s backdoors to access the honeypot and started deploying some new utilities to better understand the nature of our server, trying to understand what exactly we are doing to its malware. 

You can read the details here.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading