1 min read

New IoT Malware Spreads Through GitHub and Pastebin

Silviu STAHIE

November 09, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
New IoT Malware Spreads Through GitHub and Pastebin

Security researchers have discovered a new malware designed to affect Linux-based x86 servers, along with Linux ARM and MIPS-based IoT devices, that’s been using many infections vectors, including GitHub and Pastebin.

Malware using GitHub and Pastebin as points of infection is not something new. Attackers draw some advantages from using known, stable and large platforms, but it also comes with a disadvantage. These platforms are scrutinized much more carefully, and malware is quickly discovered. Bad actors know this, so they try to infect as many endpoints as possible before security researchers find them.

Researchers named the new malware Gitpaste-12 because it uses GitHub, Pastebin and 12 other ways to compromise systems. Furthermore, the worm has 12 attack modules, and, from the looks of it, more are in development. The malware spreads through the use of existing vulnerabilities and by brute-forcing passwords.

“Immediately after compromising a system, the malware sets up a cron job it downloads from Pastebin, which in turn calls the same script and executes it again each minute,” explained the researchers. “This is presumably one mechanism by which updates to the cron jobs can be pushed to the botnet. The main shell script uploaded during the attack to the victim machine starts to download and execute other components of Gitpaste-12.”

The malware doesn’t simply infect the device; it also actively compromises its security, like removing any firewall, selinux and apparmor rules, along with any security solutions it might encounter.

Of course, once the malware infects a device, it immediately starts to look for other endpoints to infect, using the same methods. The researchers reported the issues to GitHub and the repository used in the attack was quickly closed. Unfortunately, this doesn’t mean that it’s gone, just that the attackers will likely move to another platform.

Few indicators of compromise are available, but it looks like some of the compromised systems have the 30004 and 30005 TCP ports open.

tags


Author



Right now

Top posts

The Holiday Guide to Tech Support: Fixing the Family Computer

The Holiday Guide to Tech Support: Fixing the Family Computer

November 24, 2021

2 min read
Bitdefender Celebrates 20 Years of Cybersecurity Leadership

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 04, 2021

3 min read
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

October 26, 2021

3 min read
What are drive-by download attacks and how do you prevent them?

What are drive-by download attacks and how do you prevent them?

October 25, 2021

2 min read
Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

October 22, 2021

2 min read
Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

October 20, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Common Credentials Criminals Use in IoT Dictionary Attacks Revealed Common Credentials Criminals Use in IoT Dictionary Attacks Revealed
Silviu STAHIE

November 30, 2021

3 min read
Interpol Busts 1,000 Cyber Crooks and Recovers $27M in Massive Fraud Crackdown Interpol Busts 1,000 Cyber Crooks and Recovers $27M in Massive Fraud Crackdown
Filip TRUȚĂ

November 29, 2021

2 min read
Social media firms will be forced to unmask online trolls, says Australia Social media firms will be forced to unmask online trolls, says Australia
Graham CLULEY

November 29, 2021

2 min read