blog.barracuda.com Open in urlscan Pro
4.234.25.19  Public Scan

URL: https://blog.barracuda.com/2024/03/06/threat-spotlight-shellshock-bugs-miners
Submission: On May 30 via api from US — Scanned from GB

Form analysis 1 forms found in the DOM

GET https://blog.barracuda.com/search

<form method="GET" class="cmp-search-box__form" action="https://blog.barracuda.com/search">
  <input class="cmp-search-box__form__input" type="search" name="searchTerm" aria-label="Search for" placeholder="Search" value="" data-cmp-hook-header="searchInput">
  <a href="#" class="cmp-search-box__form__search-btn" aria-label="Search" data-cmp-hook-header="searchSubmit">
        <span class="cmp-search-box__form__search-btn__icon"></span>
    </a>
</form>

Text Content

 * Home
 * Ransomware Protection
 * AI and Security
 * Research

 * Home
 * Ransomware Protection
 * AI and Security
 * Research

TYPE AND PRESS ENTER TO SEARCH


THREAT SPOTLIGHT: WEB APPS UNDER ACTIVE THREAT FROM 10-YEAR-OLD SHELLSHOCK BUGS
AND MINERS

Topics:
Mar. 6, 2024
|
Tushar Richabadas
Tweet
Share
Share
Tweet
Share
Share

The Shellshock bugs — there are six related CVE designations — have the highest
severity rating of 10. They exist in the Unix Bash shell, which is the default
command-line interface on all Linux, Unix, and Mac-based operating systems. If
successfully exploited, Shellshock could enable an attacker to cause Bash to
execute arbitrary commands and gain unauthorized access to many internet-facing
services, such as web servers, that use Bash to process requests.


VULNERABLE SOFTWARE UNDER ACTIVE ATTACK

The top three vulnerabilities currently being targeted with Shellshock attacks
are in the chart below. They highlight how vulnerabilities can lurk for years
undetected in the software supply chain.

A device could be running the latest version of firmware, yet still be
vulnerable, because the people creating that software did not update the
libraries in their supply chain.



CVE-2019-7481 is a 7.5 rated SQL injection vulnerability in a security service
for which a patch exists. CVE-2021-42071 is a critical 9.8 rated vulnerability
in a visual tool application that could allow an unauthenticated attacker to
achieve remote command execution.


INSTALLING MIRAI BOTNET VARIANTS

CVE-2019-7481 has been targeted since at least 2021 by attackers trying to
install Mirai botnet variants. The Mirai botnet comprises a vast number of
hacked connected (IoT) devices and is used predominantly to launch DDoS attacks.

Since Mirai first came to the forefront in August 2016, researchers have seen
multiple variants appear on the threat landscape. Mirai primarily targets IoT
Linux-based devices. Most of the attacks start by downloading a shell script
that then downloads several platform-specific malware binaries and attempts to
run them. Once infected, the device becomes part of the growing botnet.

The first two Mirai variants that we saw in our logs were going after the LuCI
web interface for OpenWRT-based routers. This is a management interface that
should not be exposed to the internet. Unfortunately, it often is, and attackers
use this to their advantage.

The first variant was used by attackers trying to execute a shell script named
“sorry.sh”.

This script is no longer available. According to URLhaus, it has been reported
and taken down. However, the analysis on URLhaus makes it clear that this is
part of a Mirai/Gafgyt infestation attempt. A more detailed description is
available on VirusTotal.



The second variant is still active.

The attackers using this variant delete everything in the root directory and
then download a shell script in /tmp.



The shell script when executed downloads several platform-specific binaries and
then executes them in order.

The developer of this specific script appears to have a sense of humor. The
downloaded files are renamed using an escalating series of insults (duly
censored in the screenshot.)


A different Mirai/Gafgyt variant was targeting a remote command execution
vulnerability in Zyxel routers. The URLhaus entry shows that this was also a
Mirai “infector” (huhu.mips) — though it is now offline. Looking at the entry
for the IP address, it is currently serving the malware with a new name
(skyljne.mips.)



CRYPTOMINER INFECTIONS TARGETING VULNERABILITIES

In addition to Shellshock, we have seen attackers targeting vulnerabilities to
install cryptominers.

Back in 2022, we saw cryptominers attempting to exploit the then new Atlassian
Confluence vulnerability. In February 2024, we are seeing active attempts to
exploit years old ThinkPHP vulnerabilities and install XMRig miners.

The first URL we saw was:


Decoding the partial base64, we find the following command:

This shows up on ANY.RUN as the XMRig miner. At the time of writing this blog,
the miner is still online.

Another example of this is:

This decodes to:


An analysis of this shell script on ANY.RUN shows that it downloads the redtail
binary as well.

A third example of this is the same 45.x IP serving a different script:


This decodes to:


Per VirusTotal, this is likely a miner too.

A final example of the miner is this one:


This decodes to:


The name of the miner in this case is not obfuscated and is directly
identifiable as XMRig. It is currently offline.

All the miner examples are targeting older ThinkPHP vulnerabilities — remote
code execution (RCE) vulnerabilities from 2018 and 2020 that should rightfully
be patched by now.


KEEPING YOUR APPLICATIONS SECURE

These types of attacks come and go in waves, with each wave — both for Mirai and
for cryptominers —targeting specific vulnerabilities in campaigns.

Around 10 years ago, attackers mainly looked for and used newer vulnerabilities
such as zero days to try to get into the network. This has shifted to attackers
working smarter, not harder. They’ve caught onto the fact that software supply
chains are rarely fully secure, and they are using older but still unpatched
vulnerabilities to their advantage.

The software supply chain security issue is quite difficult to solve — you could
deploy the latest version of your file transfer software, but under the hood
that software might be using a vulnerable version of Log4J. You assume your
application is secure, but in fact it has a known vulnerability. And the only
way to find this out is if you are running regular vulnerability scans. In the
case of Log4J, you are likely doing this. But what happens if the vulnerability
is in a relatively unknown library that is only used in this one software?

The old defense-in-depth advice remains relevant. Having a defensive “onion” for
your network and applications is crucial to preventing attacks before they can
reach your application. This approach will also give you time and aircover for
when you have not yet been able to patch a new zero day.

Protection against DDoS also remains critical. Attackers are using years old
vulnerabilities to create their botnets and perform newer types of DDoS attacks
such as HTTP/2 Rapid Reset. Having a solution in place that can stop older
volumetric DDoS attacks, and newer, subtler application DDoS attacks is critical
for business continuity.

If you look at the vulnerabilities mentioned above and in our recent application
security Threat Spotlight, you see that when it comes to applications, the
software supply chain is a weak link that needs and deserves a significant
protective layer.

Scan your web applications for vulnerabilities
Tushar Richabadas

Tushar Richabadas is Senior Product Marketing Manager, Applications and Cloud
Security, Barracuda.  Prior to this role, Tushar was a Product Manager for the
Barracuda Web Application Firewall and Barracuda Load Balancer ADC, with a focus
on cloud and automation.  Tushar has a wide range of experience, from leading
networking product testing teams and technical marketing for HCL-Cisco. Tushar
closely tracks the rapidly increasing impact of digital security and is
passionate about simplifying digital security for everyone.

Connect with him on LinkedIn here.

Related Posts:
Dell: 49 million customer records exposed in 1 automated attack
Barracuda wins 5 Global InfoSec Awards
Threat Spotlight: The remote desktop tools most targeted by attackers in the
last year
AI promises to improve application security
Tweet
Share
Share
Tweet
Share
Share

--------------------------------------------------------------------------------


Popular Posts

Who is behind Cactus ransomware? LockBit to FBI: 'You can't stop me' How
attackers weaponize generative AI through data poisoning and manipulation
ALPHV-BlackCat ransomware group goes dark 5 Ways cybercriminals are using AI:
Malware generation

Topics

13 Email Threat Types Ransomware Protection Microsoft 365 Email Protection
Network Protection Application and Cloud Protection Data Protection and Recovery
Healthcare Education Industrial and IoT Security Managed Services Digital
Transformation Barracuda Engineering

Resources

Free Email Threat Scan Cyber Liability Insurance Guide Careers at Barracuda
Barracuda Engineering Barracuda News Room

2024 © Journey Notes
 * Email Protection
 * Application Protection
 * Network Protection
 * Data Protection
 * Managed XDR




COOKIE ACCEPTANCE

We use cookies to make our website work. We and our partners would also like to
set optional cookies for analytics purposes, as well as to measure and improve
the performance of the website, and to remember your preferences and provide you
enhanced functionality and personalization. Click on the Cookies Preferences
button to find out more and set your preferences.

Click on the Accept All button if you consent to the use of all such cookies. If
you choose to allow the use of such cookies, you will be able to withdraw your
consent at any time. Please refer to our Privacy Policy to better understand
your rights.Privacy Policy
Accept All Cookies
Cookie Preferences



HOW BARRACUDA USES COOKIES




YOUR PRIVACY

YOUR PRIVACY

Barracuda Sites may request cookies to be set on your device. We use cookies to
let us know when you visit our Barracuda Sites, to understand how you interact
with us, to enrich and personalize your user experience, to enable social media
functionality and to customize your relationship with Barracuda, including
providing you with more relevant advertising. Note that blocking some types of
cookies may impact your experience on our Barracuda Sites and the services we
are able to offer.


 * STRICTLY NECESSARY COOKIES
   
   STRICTLY NECESSARY COOKIES
   
   Always Active
   Strictly Necessary Cookies
   
   These cookies are necessary for the website to function and cannot be
   switched off in our systems. They are usually only set in response to actions
   made by you which amount to a request for services, such as setting your
   privacy preferences, logging in or filling in forms. You can set your browser
   to block or alert you about these cookies, but some parts of the site will
   not then work.


 * ANALYTICS COOKIES
   
   ANALYTICS COOKIES
   
   Analytics Cookies
   
   These cookies help Barracuda to understand how visitors to our pages engage
   within their session. Analytics Cookies assist in generating reporting site
   usage statistics which do not personally identify individual users.


 * PERFORMANCE COOKIES
   
   PERFORMANCE COOKIES
   
   Performance Cookies
   
   These cookies allow us to count visits and traffic sources so we can measure
   and improve the performance of our site. They help us to know which pages are
   the most and least popular and see how visitors move around the site. If you
   do not allow these cookies we will not know when you have visited our site,
   and will not be able to monitor its performance.


 * TARGETING COOKIES
   
   TARGETING COOKIES
   
   Targeting Cookies
   
   These cookies may be set through our site by our advertising partners. They
   may be used by those companies to build a profile of your interests and show
   you relevant adverts on other sites. They do not directly identify you, but
   are based on uniquely identifying your browser and internet device. If you do
   not allow these cookies, you will experience less targeted advertising.


 * FUNCTIONAL COOKIES
   
   FUNCTIONAL COOKIES
   
   Functional Cookies
   
   These cookies enable the website to provide enhanced functionality and
   personalisation. They may be set by us or by third party providers whose
   services we have added to our pages. If you do not allow these cookies then
   some or all of these services may not function properly.

Back Button


ADVERTISING COOKIES

Filter Button
Consent Leg.Interest
Select All Vendors
Select All Vendors
Select All Hosts

Select All



Clear Filters

Information storage and access
Apply
Confirm My Choices