Paper: Mayhem - a hidden threat for *nix web servers

Posted by   Virus Bulletin on   Jul 17, 2014

New kind of malware has the functions of a traditional Windows bot, but can act under restricted privileges in the system.

One of the main trends in malware in recent years is a sudden focus on malware targeting Linux and Unix (web) servers. By targeting these servers, malware authors not only make user of far better network connections and more powerful servers than the average Windows PC has, the servers are also less likely to be updated on a regular basis and they are less likely to run security software.

Earlier this year, we published an article by four researchers from Yandex in Russia on the 'Effusion' malware, that targeted servers running Nginx and only last week researchers from Kaspersky wrote a blog about 'Mayday', a DDoS trojan targeting Linux servers.

Today, we publish a paper by three of the aforementioned Yandex researchers (Andrew Kovalev, Konstantin Otrashkevich and Evgeny Sidorov) in which they analyse 'Mayhem', a new kind of malware that runs on *nix servers and is able to gain maximum benefits, even when running under restricted privileges on the target system.

Mayhem, a partial analysis of which was previously published by Malware Must Die!, infects a server via PHP script. Once installed, the malware runs in an infinite loop and uses HTTP POST to send information to and receive instructions from a command and control server. The core functionality of the malware is determined by a number of plug-ins, which are stored in a hidden file system. Most of the plug-ins help those controlling the malware find other web servers to infect, either by looking for vulnerabilities or by using brute force to gain access.

The researchers also managed to gain access to two command and control servers. This allowed them to determine that the malware had infected at least 1,400 servers, most of which are located in the USA, Russia, Germany and Canada. They also found a number of plug-ins that have yet to be seen in the wild, including one that exploits the Heartbleed vulnerability in OpenSSL.

You can download this paper here in HTML format, or here as a PDF (no registration required).

If you are interested in Linux malware, make sure you attend VB2014, where Evgeny Sidorov and Konstantin Otrashkevich will co-present a paper on 'CDorked' and 'Ebury'. You find information on how to register for the conference here.



Posted on 17 July 2014 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2021 call for papers - now open, to all!

The call for papers for VB2021 is now open and we want to hear from you - we're planning for flexible presentation formats, so everyone is encouraged to submit, regardless of whether or not you know at this stage whether you'll be able to travel to…

In memoriam: Yonathan Klijnsma

We were very sorry to learn of the passing of researcher Yonathan Klijnsma last week. Here, former VB Editor Martijn Grooten shares his memories of a talented researcher and a very kind person: this month, infosec lost a really good one.

VB2020 localhost videos available on YouTube

VB has made all VB2020 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2020 presentation & paper: 2030: backcasting the potential rise and fall of cyber threat intelligence

At VB2020 localhost, threat intelligence consultant Jamie Collier used the analytical technique of backcasting to look at the rise and fall of the cyber threat intelligence industry.

VB2020 presentation: Behind the Black Mirror: simulating attacks with mock C2 servers

At VB2020 localhost, Carbon Black's Scott Knight presented an approach he and his colleagues have taken to more realistically simulate malware attacks.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.