Security Architecture, Endpoint/Device Security, IoT, Threat Management, Threat Management, Threat Management, Malware, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Cryptomining campaign pulls new ‘Linux Rabbit’ malware out of its black hat

A two-month Monero cryptomining campaign targeted both Linux-based servers and Internet of Things devices with a newly discovered malware family called “Linux Rabbit,” researchers have reported.

The operation occurred in two phases, each of which used a distinct version of Linux Rabbit that shares the same code base as the other iteration, according to a Dec. 6 blog post from Anomali Labs.

The first phase commenced in August 2018 and involved the original Linux Rabbit malware, which was coded to infect Linux-based servers in Russia, South Korea, the U.K., and the U.S. The second lasted from September through October and used a self-propagating worm variant of Linux Rabbit known as Rabbot. Rabbot was developed to infect servers across a wider geographic range while also adding Linux-based IoT devices to its target list.

The Linux Rabbit family's final payload is the CNRig miner if the infected device is an x86-bit Intel machine, and the Coinhive miner if the host runs on an ARM processor or MIPS architecture. Additionally, the malware injects Coinhive script tags into all of the web server's HTML files, so that users who visit the server or its website also become infected.

According to Anomali, Linux Rabbit uses Tor hidden services and gateways to communicate with its malicious C2 server. "The payload for the malware is then sent from the C2 server as an encoded URL parameter," the blog post explains.

The malware next establishes persistence via “rc.local” files and “.bashrc” files, then employs brute-force techniques to steal SSH passwords that will allow Linux Rabbit to install the miner. Other functionalities include receiving malware updates from GitHub, detecting and deleting other miners that were previously installed on machines, and activating a kill switch.

The Rabbot variant is able to go after IoT devices as well because it can exploit a range of old vulnerabilities, including two critical code execution bugs that were found jsut this year in NUUO's NVRMini2 firmware (CVE-2018-1149) and the SonicWall Global Management System (CVE-2018-9866).

Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.