Linux malware “perfctl” behind years-long cryptomining campaign

Linux malware “perfctl” behind years-long cryptomining campaign

October 3, 2024 at 10:39AM

Summary:

The Linux malware “perfctl” has evaded detection for at least three years, targeting servers for cryptomining purposes. It exploits misconfigurations and known vulnerabilities to gain initial access, deploys rootkits for evasion, and communicates with threat actors over TOR. Aqua Nautilus offers detection and mitigation strategies to combat perfctl’s activities.

Word count: 50

Based on the meeting notes, it seems that there is a significant threat from a Linux malware called “perfctl” which has been targeting Linux servers and workstations for at least three years.

The malware is primarily used for cryptomining, specifically mining the hard-to-trace Monero cryptocurrency. However, it could also be used for other damaging operations.

The infection chain involves exploiting misconfigurations or exposed secrets to breach Linux servers. The malware is also observed to exploit certain vulnerabilities such as CVE-2023-33246 and CVE-2021-4034.

Once initial access is established, the malware downloads and executes a payload, hides itself in system locations for persistence, and uses evasion mechanisms such as encrypted communication and rootkits to avoid detection.

Users usually become aware of the infection when they notice a significant increase in CPU utilization due to the cryptomining activities.

Aqua Nautilus has proposed several ways to detect and stop perfctl, including system monitoring, network traffic analysis, file and process integrity monitoring, and proactive mitigation measures. This includes regular inspection of system directories, monitoring CPU usage, capturing and analyzing network traffic, patching known flaws in internet-facing applications, and implementing role-based access controls.

Given the sophistication and evasive nature of the perfctl malware, it is crucial for system administrators to stay vigilant and follow the recommended detection and mitigation steps to protect their Linux servers and workstations.

Full Article