{"id":20063,"date":"2022-09-09T16:10:28","date_gmt":"2022-09-10T00:10:28","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/09\/09\/news-13796\/"},"modified":"2022-09-09T16:10:28","modified_gmt":"2022-09-10T00:10:28","slug":"news-13796","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/09\/09\/news-13796\/","title":{"rendered":"Evasive Shikitega Linux malware drops Monero cryptominer"},"content":{"rendered":"<p>Researchers from the AT&amp;T Alien Labs Resarch have <a href=\"https:\/\/cybersecurity.att.com\/blogs\/labs-research\/shikitega-new-stealthy-malware-targeting-linux\">discovered a new and stealthy Linux malware<\/a> it&#8217;s dubbed Shikitega. Once it&#8217;s on a machine or device, Shitega executes a &#8220;multistage infection chain&#8221; involving small files, a couple of vulnerabilities, and the use of Mettle, a portable Metasploit Meterpreter. Shikitega can give threat actors complete control of an&nbsp;infected system, with a persistent cryptominer churning out Monero in the background.<\/p>\n<h2>The chain<\/h2>\n<p>At its core, Shikitega is evasive, and its sneakiness becomes apparent the moment its infection chain begins.<\/p>\n<p>AT&amp;T reports that Shikitega is dropped onto Linux endpoints and devices by a malicious&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Executable_and_Linkable_Format\" target=\"_blank\">ELF file<\/a>&nbsp;no bigger than 400 bytes. This ELF dropper also contains an encoded&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Shellcode\" target=\"_blank\" rel=\"noreferrer noopener\">shellcode<\/a>. Once dropped, Shikitega decodes each layer of itself using the polymorphic XOR additive feedback encoder,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.rapid7.com\/db\/modules\/encoder\/x86\/shikata_ga_nai\/\" target=\"_blank\">Shikata Ga Nai<\/a>&nbsp;(or&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Shikata_ga_nai\" target=\"_blank\">&#8220;It cannot be helped&#8221;<\/a>&nbsp;from the Japanese), until the last shellcode payload is decoded. After this, the shellcode executes to reach out to its cloudflare-hosted <a href=\"https:\/\/www.malwarebytes.com\/glossary\/cc\">command-and-control (C2)<\/a>&nbsp;server to receive additional commands.<\/p>\n<p>One of these commands is to download and execute Mettle, which allows attackers to take full remote control of the compromised host machine or device. Shikitega also fetches another malicious ELF file&mdash;an exploit&mdash;to target the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2021-4034\" target=\"_blank\">CVE-2021-4034<\/a>&nbsp;and&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-3493\" target=\"_blank\">CVE-2021-3493<\/a>&nbsp;vulnerabilities. Exploiting these can elevate an attacker&#8217;s privileges, so they can download and run the XMRig Monero cryptominer as&nbsp;root.<\/p>\n<p>For this miner to persist, Shikitega downloads and executes five scripts that set four&nbsp;crontabs&nbsp;(scheduled tasks): Two for the logged-in user and two for the root user. &#8220;As the malware persists with crontabs, it will delete all downloaded files from the system to hide its presence,&#8221; the researchers said in the report.<\/p>\n<h2>Protect your Linux system from Shikitega<\/h2>\n<p>Linux users can protect their systems from Shikitega with standard Linux hardening precautions, prompt patching to close vulnerabilities like CVE-2021-4034 and CVE-2021-3493, and with effective anti-malware and <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\" target=\"_blank\" rel=\"noreferrer noopener\">EDR<\/a> on servers and endpoints. These should be paired with offsite and offline backups to provide an effective fallback.<\/p>\n<p>Forget what you may have heard about Linux not having malware&mdash;every operating system is targeted by threat actors, and every one has malware. It&#8217;s just that the tactics techniques and procedures vary according to the way the operating systems work, and roles they play in our lives and on our business networks.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/09\/evasive-shikitega-linux-malware-drops-monero-cryptominer\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/news' rel='category tag'>News<\/a><\/p>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/threats' rel='category tag'>Threats<\/a><\/p>\n<p>Researchers from the AT&#038;T Alien Labs Resarch have discovered a stealthy new Linux malware.<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/09\/evasive-shikitega-linux-malware-drops-monero-cryptominer' title='Evasive Shikitega Linux malware drops Monero cryptominer'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/09\/evasive-shikitega-linux-malware-drops-monero-cryptominer'>Evasive Shikitega Linux malware drops Monero cryptominer<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32,10438],"class_list":["post-20063","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-news","tag-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20063"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20063\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20063"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}