Wednesday, August 17, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > 8220 gang targeting Linux systems again, Microsoft says

8220 gang targeting Linux systems again, Microsoft says

Microsoft announced that 8220 gang updates its techniques to deploy the new versions of cryptominer and IRC bot.


Erdem Yasar Erdem Yasar
July 1, 2022
2 min read
8220 gang targeting Linux systems again, Microsoft says

Microsoft warned Linux administrators about a crypto mining malware campaign. Microsoft stated that the threat actor group known as 8220 is updating its techniques and payloads to breach Linux servers to deploy a crypto miner. The Chinese-speaking gang is active since 2017 and is known for Monero-mining activities. The group is named after port 8220, which they prefer to communicate with command-and-control. The 8220 gang is also known as the creator of whatMiner.

Confluence and WebLogic vulnerabilities

Microsoft stated that the new campaign is targeting i686 and x86_64 Linux systems. The gang is mainly exploiting two vulnerabilities to deploy the crypto miner, CVE-2022-26134 found in Confluence and CVE-2019-2725 found in WebLogic. Once they established the initial access, the loader is downloaded from jira[.]letmaker[.]top, which is capable of clearing log files and disabling cloud monitoring and security tools to evade detection.

Then it downloads pwnRig crypto miner version 1.41.0 and an IRC bot to run commands from a C2 server. The loader also uses an IP port scanner tool to find other SSH servers in the network and uses a brute force tool named spirit to propagate. It also scans for SSH keys to move laterally by connecting to known hosts. Microsoft urged users to protect their networks against this threat and stated that Microsoft Defender for Endpoint on Linux detects malicious behaviors and payloads related to this campaign.

We observed notable updates to the long-running malware campaign targeting Linux systems by a group known as the 8220 gang. The updates include the deployment of new versions of a cryptominer and an IRC bot, as well the use of an exploit for a recently disclosed vulnerability.

— Microsoft Security Intelligence (@MsftSecIntel) June 29, 2022

Microsoft’s announcement came shortly after Akamai‘s announcement about the Confluence zero-day vulnerability. Akamai stated that exploitation attempts have settled at around 20,000 per day, down from 100,000. After the disclosure, approximately 6,000 IPs are attempting to exploit the Atlassian vulnerability every day. Akamai said;

« As defenders, we have to be extra vigilant, especially when zero-day attacks pop up. These types of attacks have a massive impact on the community. The effects are much more than headline news, these are real exploits that affect real people, how much time they are spending at work, and how they get their jobs done.

What is particularly concerning is how much of a shift upward this attack type has garnered over the last several weeks. As we have seen with similar vulnerabilities, this CVE-2022-26134 will likely continue to be exploited for at least the next couple of years. Due to the large uptick in the baseline of attacks attempts today, this attack type could potentially become a known TTP, a heavily used tool in an attacker’s arsenal moving forward. »

See more Cybersecurity News


Tags: Akamai TechnologiesMicrosoft

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Micropyramid lenses boost the light by triple on solar panels

Micropyramid lenses will triple the efficiency on solar panels

Related News

Critical Realtek vulnerability leaves networking devices at risk

Critical Realtek vulnerability leaves networking devices at risk

August 17, 2022 7:15 pm
Trend Micro warned about incomplete or faulty patches

Trend Micro warned about incomplete or faulty patches

August 17, 2022 7:00 pm
1,900 Signal users' phone numbers may be exposed

1,900 Signal users’ phone numbers may be exposed

August 16, 2022 10:05 pm
10 malicious packages found on PyPI

10 malicious packages found on PyPI

August 16, 2022 9:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the Cloud7 Newsletter

Sign up for the Cloud7 Newsletter to receive the latest IT business updates straight to your inbox daily.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

10 Best Web Hosting Services of 2022

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Recent News

  • Deepin 23 Preview is released with atomic updates
  • Critical Realtek vulnerability leaves networking devices at risk
  • Trend Micro warned about incomplete or faulty patches
  • Proton 7.0-4 comes with support for more games
  • Cloud7 Podcast – Episode 10: Software-Defined Storage


Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.