15 May 2024

Ebury botnet infects 400K Linux servers for cryptocurrency theft


Ebury botnet infects 400K Linux servers for cryptocurrency theft

ESET researchers published details on a decade-long botnet operation, which has infected nearly 400,000 Linux servers since its inception in 2009. Despite the arrest of one perpetrator after the initial exposure in 2014, the malware has continued to thrive, morphing and expanding its reach for financial gain.

Ebury is an OpenSSH backdoor and credential stealer, with roughly 100,000 servers still compromised as of late 2023. ESET said that it has observed significant updates in the malware capabilities over the years, notably in 2014 and 2017.

Ebury leverages its access to hosting provider infrastructures, where it installs itself across rented servers within days. The malware employs sophisticated tactics, such as intercepting SSH traffic within data centers and utilizing compromised servers for ARP spoofing, to propagate itself and steal credentials.

“Ebury operators leverage existing Ebury-compromised servers in the same network segment as their target to perform ARP spoofing,” the report said. “According to internet telemetry, more than 200 servers were targeted in 2023. Among the targets are Bitcoin and Ethereum nodes. Ebury automatically steals cryptocurrency wallets hosted on the targeted server once the victim types the password to log into it.”

Over the years, Ebury's arsenal has been upgraded with new techniques and updates, including version 1.8 released in late 2023. This update introduces enhanced obfuscation methods, a new domain generation algorithm (DGA), and improvements to its userland rootkit, rendering it even more challenging for system administrators to detect.


Back to the list

Latest Posts

Cyber Security Week in Review: October 4, 2024

Cyber Security Week in Review: October 4, 2024

In brief: the US disrupts FSB-linked ColdRiver hackers’ operations, Lockbit and EvilCorp members arrested, and more.
4 October 2024
Critical Ivanti EPM RCE flaw exploited in the wild

Critical Ivanti EPM RCE flaw exploited in the wild

The flaw is an SQL Injection issue that allows a remote attacker to execute arbitrary SQL queries in database.
3 October 2024
New China-aligned threat actor CeranaKeeper steals data from Southeast Asian entities

New China-aligned threat actor CeranaKeeper steals data from Southeast Asian entities

CeranaKeeper is notable for its evolving backdoor techniques, which allow it to evade detection and facilitate extensive data theft.
3 October 2024