HomeVulnerabilityAttackers deploy rootkits on misconfigured Apache Hadoop and Flink servers

Attackers deploy rootkits on misconfigured Apache Hadoop and Flink servers

From rootkits to cryptomining

Within the assault chain in opposition to Hadoop, the attackers first exploit the misconfiguration to create a brand new utility on the cluster and allocate computing assets to it. Within the utility container configuration, they put a collection of shell instructions that use the curl command-line instrument to obtain a binary referred to as “dca” from an attacker-controlled server contained in the /tmp listing after which execute it. A subsequent request to Hadoop YARN will execute the newly deployed utility and due to this fact the shell instructions.

Dca is a Linux-native ELF binary that serves as a malware downloader. Its major objective is to obtain and set up two different rootkits and to drop one other binary file referred to as tmp on disk. It additionally units a crontab job to execute a script referred to as dca.sh to make sure persistence on the system. The tmp binary that’s bundled into dca itself is a Monero cryptocurrency mining program, whereas the 2 rootkits, referred to as initrc.so and pthread.so, are used to cover the dca.sh script and tmp file on disk.

See also  ASUS warns of vital distant authentication bypass on 7 routers

The IP handle that was used to focus on Aqua’s Hadoop honeypot was additionally used to focus on Flink, Redis, and Spring framework honeypots (by way of CVE-2022-22965). This implies that the Hadoop assaults are possible half of a bigger operation that targets completely different applied sciences, like with TeamTNT’s operations prior to now. When probed by way of Shodan, the IP handle appeared to host an online server with a Java interface named Stage that’s possible a part of the Java payload implementation from the Metasploit Framework.

“To mitigate vulnerabilities in Apache Flink and Hadoop ResourceManager, particular methods should be applied,” Assaf Morag, a security researcher at Aqua Safety, tells CSO by way of electronic mail. “For Apache Flink, it’s essential to safe the file add mechanism. This includes limiting the file add performance to authenticated and approved customers and implementing checks on the forms of information being uploaded to make sure they’re official and protected. Measures like file measurement limits and file sort restrictions may be notably efficient.”

See also  Prime cybersecurity M&A offers for 2023

In the meantime, Hadoop ResourceManager must have authentication and authorization configured for API entry. Attainable choices embrace integration with Kerberos — a typical alternative for Hadoop environments — LDAP or different supported enterprise person authentication programs.

“Moreover, organising entry management lists (ACLs) or integrating with role-based entry management (RBAC) programs may be efficient for authorization configuration, a characteristic natively supported by Hadoop for numerous providers and operations,” Morag says. It’s additionally really helpful to contemplate deploying agent-based security options for containers that monitor the atmosphere and might detect cryptominers, rootkits, obfuscated, or packed binaries and different suspicious runtime behaviors.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular