Stealthy Cryptomining Campaign: How Hackers Turned Ordinary Websites into Malware Havens

VulnCheck uncovered a cryptomining campaign using the Linuxsys miner, active since 2021. By planting malware on compromised legitimate websites, attackers cleverly dodge security filters. Their strategy is sneakier than a ninja in a library, keeping their infrastructure hidden while mining away.

Pro Dashboard

Hot Take:

Who knew that while we were busy arguing whether pineapple belongs on pizza, hackers were secretly cooking up a cryptocurrency buffet right under our noses? This cryptomining campaign is like a digital ninja, stealthily using legitimate websites as its nunchucks. I guess the lesson here is, trust no one, not even your favorite cat meme site!

Key Points:

  • The Linuxsys miner has been running a cryptomining campaign since 2021 using compromised legitimate websites.
  • The attacker bypasses security filters by planting malware on sites with valid SSL certificates.
  • VulnCheck identified exploit attempts linked to the CVE-2021-41773 vulnerability.
  • The attack uses a script, linux.sh, to download malware from five compromised websites.
  • Indicators of compromise include specific IPs, URLs, and file hashes, with detection rules provided by VulnCheck.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?