According to statistics obtained by hanipotes, the most active malicious programs are members of the Linux.Mirai family, accounting for more than 34% of attacks. These are followed by the Linux.DownLoader loaders (3% of the attacks) and the Linux.ProxyM Trojans (1.5% of the attacks). The top ten also includes malicious applications Linux.Hajime , Linux.BackDoor.Fgt , Linux.PNScan, Linux.BackDoor.Tsunami and Linux.HideNSeek. The percentage of the most active Trojans is presented in the following illustration:
Linux.Mirai is one of the most active Trojans attacking IoT devices. The first version of this malicious application appeared in May 2016. Later, its source codes were published in free access, so it quickly appeared a large number of modifications created by various virus writers. Now Linux.Mirai is the most common Trojan for Linux, which runs on a variety of processor architectures such as x86, ARM, MIPS, SPARC, SH-4, M68K, etc.
After infecting the target Linux device. Mirai connects to the management server and waits for further commands from it. The main function of this Trojan is to conduct DDoS attacks.
The following graph shows the dynamics of the detection of active copies of this malicious application by hanipotes:
Various modifications of Linux.Mirai are most active in China, Japan, USA, India and Brazil. Below are the countries where during the observations the maximum number of bots of this family was recorded.
Another dangerous malicious application infecting smart devices is Linux.Hajime . This Trojan has been known to virus analysts since the end of 2016. It works on ARM, MIPS and MIPSEL architectures and implements the network worm function, spreading using the Telnet protocol. Infected devices are included in the decentralized P2P botnet and are used to further infect available objects on the Web. The malicious program blocks the access of other malicious programs to successfully attacked devices, closing ports 23, 7547, 5555 and 5358 on them.
The peak of Linux.Hajime activity was at the end of 2016 - the beginning of 2017, when the maximum number of simultaneously active copies of Trojans of this family exceeded 43,000. After that, the activity of malicious programs dropped and continues to gradually decline. Now the number of active bots Linux.Hajime does not exceed a few hundred.
These Trojans are most common in Brazil, Turkey, Vietnam, Mexico and South Korea. The map shows the countries with the maximum number of active Trojans Linux.Hajime , which were recorded during the entire observation period.
The top five Trojans designed to infect IoT devices include Linux.BackDoor.Fgt , which has been distributed since autumn 2015. Different versions of this malicious application support the work on the MIPS, SPARC and other architectures and work in the Linux environment. The source code for Linux.BackDoor.Fgt is publicly available, which is why it is so popular among virus writers.
These backdoors are distributed using the Telnet and SSH protocols, selecting logins and passwords for access to the attacked objects. The main purpose of these Trojans is to conduct DDoS attacks and remotely monitor infected devices.
The Linux.ProxyM Trojan is one of the malicious programs that attackers use to ensure their own anonymity on the Internet. It runs a SOCKS proxy server on infected Linux devices, through which cybercriminals pass network traffic. Dr.Web specialists discovered the first versions of Linux.ProxyM in February 2017, and this Trojan is still active.
Linux.Ellipsis.1 is another Trojan designed to transform Internet of Things and Linux devices into proxy servers. He was caught by Doctor Web analysts in 2015. Once launched, it deletes the log files and blocks their re-creation, deletes some system utilities, and also prevents the device from communicating with specific IP addresses. If the Trojan detects suspicious traffic from one of the addresses, it also blacklists this IP. In addition, at the command of the managing server Linux.Ellipsis.1, the applications that connected to the forbidden addresses are terminated.
Doctor Web discovered the first versions of the Linux.LuaBot family of Trojans in 2016. These malicious applications are written in the Lua scripting language and support devices with Intel x86_64 architecture, MIPS, MIPSEL, Power PC, ARM, SPARC, SH4 and M68k. They consist of several dozen scripts, modules, each of which performs a specific task. Trojans are able to receive updates from these modules from the management server, as well as download new ones. Linux.LuaBot is a multifunctional malicious application. Depending on the modification of malicious applications and a set of scripts, attackers can use them to remotely control infected devices, as well as create proxy servers to anonymize the web.
For intruders, mining (mining) cryptocurrency is one of the main reasons for infecting IoT devices. The Linux.BtcMine family of Trojans and other malicious applications help them with this. One of them - Linux.BtcMine.174 - was found by Doctor Web experts at the end of 2018. It is intended for mining Monero (XMR). Linux.BtcMine.174 is a script written in the command shell language sh. If it was not launched on behalf of the superuser (root), the Trojan attempts to elevate its privileges with several exploits.
Linux.BtcMine.174 searches for antivirus processes and attempts to terminate them, as well as to delete the files of these programs from the device. Then it downloads and launches several additional components, including a backdoor and a rootkit module, and then launches a miner program on the system.
The Trojan is assigned to autoload, so it does not fear rebooting an infected device. In addition, he periodically checks whether the miner's process is active. If necessary, he initiates it again, ensuring the continuity of the production of cryptocurrency.
The Linux.MulDrop family of Trojans is used to distribute and install other malicious applications. They work on many hardware architectures and device types, but in 2017, Dr.Web virus analysts discovered the Linux.MulDrop.14 Trojan, which purposefully attacked Raspberry Pi computers. This dropper is a script in the body of which an encrypted program is stored — the cryptocurrency miner. Once launched, the Trojan unpacks and launches the miner, after which it attempts to infect other devices available in the network environment. In order to prevent “competitors” from accessing the resources of an infected device, Linux.MulDrop.14 blocks network port 22.
The Linux.HideNSeek malware infects “smart” devices, computers and servers running Linux, integrating them into a decentralized botnet. For distribution, this Trojan generates IP addresses and attempts to connect to them using the selection of logins and passwords in the dictionary, as well as a list of known combinations of authentication data. In addition, it is able to exploit various equipment vulnerabilities. Linux.HideNSeek can be used to remotely manage infected devices — execute commands from attackers, copy files, etc.
Unlike most other malicious programs, the Linux.BrickBot Trojans are not intended to be of any benefit. These are vandals that are designed to disable computers and smart devices, they have been known since 2017.
Linux.BrickBot Trojans are trying to infect devices through the Telnet protocol, selecting logins and passwords for them. Then they try to erase the data from their persistent storage modules, reset the network settings, block all connections and perform a reboot. As a result, to restore the work of damaged objects, they will need to be reflashed or even replaced components. Such Trojans are rare, but extremely dangerous.
At the end of June 2019, the Linux.BrickBot.37 Trojan, also known as Silex, became popular. It acted in a similar way to other members of the Linux.BirckBot family — erasing data from device drives, deleting their network settings and performing a reboot, after which they could no longer correctly switch on and work. Our traps recorded over 2600 attacks of this Trojan.
Source: https://habr.com/ru/post/460433/
All Articles