@laceworklabs
Cloud Wars: Episode V - The Cryptojacker Strikes Back
James Condon
BSides Denver 2019
@laceworklabs
whoami
• James Condon, Director of Research @ Lacework
• Former USAF OSI, Mandiant, and ProtectWise
• Network Forensics, Incident Response, Threat Intelligence, Cloud Security
Twitter: @laceworklabs, @jameswcondon
Email: james@lacework.com
Blog: www.lacework.com/blog/
@laceworklabs
Group Discussion
@laceworklabs
@laceworklabs
CASE STUDY #1: REDIS HONEY POT
@laceworklabs
SETTING UP OUR HONEYPOT
• Ubuntu 14.04
• apt get install redis-server
• Redis 2.8.4
• Allow external access to TCP port
6379
@laceworklabs
Redis Recon
@laceworklabs
Cronjob Attempts
@laceworklabs
Cronjob Attempts
@laceworklabs
SSH Key Add
Attempt
@laceworklabs
SSH Key Add
Attempt
@laceworklabs
LUA Exploit
@laceworklabs
cURL Install Script
@laceworklabs
Pid Grep & Kill
@laceworklabs
Pid Grep & Kill
@laceworklabs
Group Discussion
@laceworklabs
CASE STUDY #2: CONFLUENCE ATTACKS
@laceworklabs
Pkill in RCE!
@laceworklabs
Hit List (Process
Killing)
@laceworklabs
Process Killing from Established Connections
@laceworklabs
Kill Processes w/ CPU Great Than 30%
@laceworklabs
@laceworklabs
Group Discussion
@laceworklabs
CASE STUDY #3: PACHA VS ROCKE
@laceworklabs
Linux.GreedyAntd (File & Process Blacklisting)
@laceworklabs
Rocke IPs Scoped to Host
@laceworklabs
Rocke IPs added
to routing table
with Host Scope
@laceworklabs
Group Discussion
@laceworklabs
CASE STUDY #4: CRYPTOSINK
@laceworklabs
Download Install Script
@laceworklabs
Symbols Left in
Binary
@laceworklabs
Redirect to
Localhost
@laceworklabs
Replace rm for Persistence
@laceworklabs
Rocke IPs added
to routing table
with Host Scope
@laceworklabs
Group Discussion
@laceworklabs
FINAL THOUGHTS
• Common eradication tactics
• Scan process listings for keywords
• Scan process listings for CPU usage
• Search for known files
• Scan established connections
• Sinkhole IPs
• Sinkhole DNS
• Sounds like Blue Team?
@laceworklabs
resources
1. Anatomy of a Redis Exploit (https://www.lacework.com/anatomy-of-a-redis-exploit/)
2. A Deep Dive Into Three Popular CVE-2019-3396 PoCs Used in Confluence Attacks
(https://www.lacework.com/cve-2019-3396-poc-deep-dive/)
3. Pacha Group Competing against Rocke Group for Cryptocurrency Mining Foothold on the Cloud
(https://www.intezer.com/blog-technical-analysis-cryptocurrency-mining-war-on-the-cloud/)
4. “CryptoSink” Campaign Deploys a New Miner Malware (https://www.f5.com/labs/articles/threat-intelligence/-
cryptosink--campaign-deploys-a-new-miner-malware)
5. https://news.ycombinator.com/item?id=18622528
6. Sustes Malware doesn’t infect victims by itself, but it is spread via brute-force activities with special focus on IoT
and Linux servers. (https://securityaffairs.co/wordpress/76394/malware/sustes-malware-cpu-monero.html)
7. A Dive into malicious Docker Containers
https://isc.sans.edu/diary/A+Dive+into+malicious+Docker+Containers/24388
@laceworklabs
QUESTIONS
Twitter: @laceworklabs, @jameswcondon
Email: james@lacework.com
Blog: www.lacework.com/blog/

BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back