Researchers recognized an assault marketing campaign concentrating on poorly secured Linux SSH servers, the place the assault leverages Supershell, a cross-platform reverse shell backdoor written in Go, granting attackers distant management of compromised programs.
Following the preliminary an infection, attackers are suspected to have deployed scanners to determine further susceptible targets after which possible launched dictionary assaults on these targets utilizing credentials harvested from the compromised programs.


The information reveals a listing of risk actor IP addresses and their corresponding root credentials, together with widespread passwords like “root/password” and “root/123456789,” that are often exploited by attackers to realize unauthorized entry to susceptible programs.
Meet the CISOs, Be a part of the Digital Panel to Study compliance – Be a part of free of charge
The presence of those credentials on compromised units signifies a major safety threat, as they can be utilized to execute malicious actions, steal delicate info, and disrupt operations.
The identification and mitigation of those vulnerabilities are essential to defending programs from potential threats.
The risk actor used varied strategies to obtain and execute malicious scripts after compromising a system.
An attacker leveraged wget, curl, tftp, and ftpget instructions to obtain scripts from totally different sources, together with internet servers, FTP servers, and even non-standard ports.


The downloaded scripts have been then executed utilizing shell instructions (sh, bash), granting the attacker distant entry and probably putting in further malware, after which attackers tried to take away traces of the assault by deleting the downloaded scripts and different information.
An attacker initially put in the obfuscated Supershell backdoor on a poorly managed Linux system, which, as recognized by its inner strings, conduct, and execution logs, supplies the attacker with distant management capabilities.
Whereas the first purpose appears to be management hijacking, there’s a risk that the attacker additionally intends to put in a cryptocurrency miner, like XMRig, to use the system’s assets for private achieve, which aligns with widespread assault patterns concentrating on susceptible Linux programs.


Menace actors are exploiting poorly managed Linux SSH servers by putting in the Supershell backdoor, which allows distant management of contaminated programs, probably resulting in knowledge theft, system compromise, and different malicious actions.
In keeping with ASEC, to mitigate this risk, directors ought to prioritize robust password hygiene, common updates, and sturdy safety measures like firewalls.
Moreover, making certain that V3 is up-to-date is essential to forestall malware infections. By implementing these countermeasures, organizations can considerably cut back their vulnerability to Supershell assaults.
The detected malware features a Cobalt Strike backdoor, a shell agent downloader, and an ElfMiner downloader, which was recognized as Backdoor/Linux.CobaltStrike.3753120 was possible deployed for distant entry and management.
The shell agent downloader, Downloader/Shell.Agent.SC203780, was designed to obtain and execute further malicious payloads.
The ElfMiner downloader, Downloader/Shell.ElfMiner.S1705, was possible used to obtain and set up cryptocurrency mining malware.
Are You From SOC/DFIR Groups? - Strive Superior Malware and Phishing Evaluation With ANY.RUN - 14-day free trial