systemten.org在之前已經被指出為kerberods挖礦病毒,透過對kerberods的感染方式,許可權維持等方式進行對比,可以確認本次的aliyun.one與kerberods挖礦家族為同一個團體在運營。該團隊在之前被Unit42團隊披露為Rocke Group黑產團伙。
0x3 感染方式
1、ssh弱口令爆破
2、ssh免密登入
3、redis未授權訪問漏洞
4、redis弱口令爆破
5、Jenkins弱口令爆破
6、Jenkins遠端程式碼執行漏洞(CVE-2018-1000861、CVE-2019-1003000)
7、ActiveMQ任意檔案寫入漏洞(CVE-2016-3088)
0x4 防護
1、更改密碼為強密碼,密碼每個機器不同
2、ssh免密登入要嚴格控制機器
3、加強redis防護,開啟redis的密碼驗證,且密碼更換未強密碼
4、檢測是否存在Jenkins弱密碼,修改密碼未強密碼
5、檢測是否存在jenkins遠端程式碼執行漏洞並進行修復
6、檢測是否存在ActiveMQ任意檔案寫漏洞。
7、檢測是否存在Confluence未授權訪問漏洞(CVE-2019-3396)
0x5 IOC
F81137FF4ED563101B3ACB8185CF16D5AF89C9E5
52AA4166F256495250C9191670DB258794059277
update.iap5u1rbety6vifaxsi9vovnc9jjay2l.com
x64.iap5u1rbety6vifaxsi9vovnc9jjay2l.com
cron.iap5u1rbety6vifaxsi9vovnc9jjay2l.com
aliyun.one
pool.supportxmr.com
sg.minexmr.com
iap5u1rbety6vifaxsi9vovnc9jjay2l.com
img.sobot.com/chatres/89/msg/20191225/1/ec0991da601e45c4b0bb6178da5f0cc4.png
img.sobot.com/chatres/89/msg/20191225/1/50659157a100466a88fed550423a38ee.png
cdn.xiaoduoai.com/cvd/dist/fileUpload/1577269944760/2.637890910155951.png
cdn.xiaoduoai.com/cvd/dist/fileUpload/1577269966297/8.872362655092918.png
https://user-images.githubusercontent.com/56861392/71443284-08acf200-2745-11ea-8ef3-509d9072d970.png
https://user-images.githubusercontent.com/56861392/71443285-08acf200-2745-11ea-96c3-0c2be9135085.png
0x6
錢包地址
48tKyhLzJvmfpaZjeEh2rmWSxbFqg7jNzPvQbLgueAc6avfKVrJFnyAMBuTn9ZeG4A3Gfww512YNZB9Tvaf52aVbPHpJFXT
0x7 Ref
https://v2ex.com/t/624351
https://www.f5.com/labs/articles/threat-intelligence/vulnerabilities--exploits--and-malware-driving-attack-campaigns-in-december-2019
https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-3396-redux-confluence-vulnerability-exploited-to-deliver-cryptocurrency-miner-with-rootkit/
https://unit42.paloaltonetworks.com/rockein-the-netflow/