{"id":2979,"date":"2018-11-09T18:38:11","date_gmt":"2018-11-09T18:38:11","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=2979"},"modified":"2018-11-12T01:49:00","modified_gmt":"2018-11-12T01:49:00","slug":"linux-cryptocurrency-miners-are-installing-rootkits-to-hide-themselves","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/11\/09\/linux-cryptocurrency-miners-are-installing-rootkits-to-hide-themselves\/","title":{"rendered":"Linux cryptocurrency miners are installing rootkits to hide themselves"},"content":{"rendered":"<p>Security researchers from Trend Micro have stumbled upon a new malware strain that mines cryptocurrency on Linux computers, but which is also different from previously seen cryptominers because it downloads a rootkit to alter the operating system&#8217;s behavior and hide the unwanted high CPU usage that usually comes with cryptocurrency mining.<\/p>\n<p>Currently, Trend Micro has not identified the way through which the malware &#8211;which they named KORKERDS&#8211; infects systems, but they don&#8217;t believe this recent wave of infections is the result of an intrusive mass-hacking campaign.<\/p>\n<p>Instead, researchers believe crooks are using poisoned Linux applications that have been modified to silently download and install the KORKERDS cryptominers during the installation process of a legitimate app. Which app? Trend Micro hasn&#8217;t figured that out yet.<\/p>\n<p>But researcher did say that the KORKERDS samples they&#8217;ve recently analyzed would do more than just install a Monero miner &#8211;also downloading and installing a rootkit, which they described as &#8220;a slightly modified\/repurposed version of publicly available code.&#8221;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/11\/09\/9cfc7630-144e-4a37-8f5c-6af223521d42\/resize\/370xauto\/1c3b382094300813c18af446833843ff\/korkerds-installation.jpg\" alt=\"korkerds-installation.jpg\" width=\"370\" height=\"auto\" \/><br \/>\nImage: Trend Micro<\/p>\n<p>Besides allowing KORKERDS to survive OS reboots, the rootkit component also contained code a slightly strange feature.<\/p>\n<p>Trend Micro says that KORKERDS&#8217; authors modified the rootkit to hide the cryptominer&#8217;s main process from Linux&#8217;s native process monitoring tools.<\/p>\n<p>&#8220;The rootkit hooks the readdir and readdir64 application programming interfaces (APIs) of the libc library,&#8221; researchers said. &#8220;The rootkit will override the normal library file by replacing the normal readdir file with the rootkit&#8217;s own version of readdir.&#8221;<\/p>\n<p>This malicious version of readdir works by hiding processes named &#8220;kworkerds&#8221; &#8211;which in this case is the cryptominers&#8217; process.<\/p>\n<p>Linux process monitoring tools will still show 100 percent CPU usage, but admins won&#8217;t be able to see (and kill) the kworkerds process causing the CPU resource consumption problems.<\/p>\n<p>Linux process monitoring tool showing 100% CPU usage, but kworkerds process responsible for this problem<\/p>\n<p>Image: Trend Micro<\/p>\n<p>Trend Micro&#8217;s KORKERDS report contains a <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cryptocurrency-mining-malware-targets-linux-systems-uses-rootkit-for-stealth\" target=\"_blank\" rel=\"noopener\">technical breakdown<\/a> of the malware&#8217;s infection routine, including file names, processes, and file hashes that Linux users may be interested in tracking and using for debugging possibly-infected systems.<\/p>\n<p>Based on the fact that KORKERDS is distributed inside legitimate apps, this also suggests the malware might also be a threat to Linux desktop users as well, and not only to servers, where almost all Linux cryptominers have been observed in the past two years.<\/p>\n<p>Linux users weren&#8217;t the only ones that have been targeted by sneaky cryptocurrency-mining malware. Trend Micro also published <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/cryptocurrency-mining-malware-uses-various-evasion-techniques-including-windows-installer-as-part-of-its-routine\/\" target=\"_blank\" rel=\"noopener\">a second report<\/a> yesterday on another malware strain that targeted Windows users and which also used various techniques in an attempt of staying hidden as much as possible on infected systems.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/linux-cryptocurrency-miners-are-installing-rootkits-to-hide-themselves\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers from Trend Micro have stumbled upon a new malware strain that mines cryptocurrency on Linux computers, but which is also different from previously seen cryptominers because it downloads a rootkit to alter the operating system&#8217;s behavior and hide the unwanted high CPU usage that usually comes with cryptocurrency mining. Currently, Trend Micro has &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/11\/09\/linux-cryptocurrency-miners-are-installing-rootkits-to-hide-themselves\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Linux cryptocurrency miners are installing rootkits to hide themselves&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2979","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/2979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=2979"}],"version-history":[{"count":1,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/2979\/revisions"}],"predecessor-version":[{"id":3202,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/2979\/revisions\/3202"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=2979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=2979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=2979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}