SOCRadar® Cyber Intelligence Inc. | Perfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and Proxyjacking
Home

Resources

Blog
Nov 25, 2024
6 Mins Read

Perfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and Proxyjacking

Linux servers, the backbone of countless organizations worldwide, have recently come under siege by a stealthy and highly evasive malware known as Perfctl. This malware campaign is proving to be one of the most advanced threats targeting Linux environments today. Designed to bypass traditional security defenses, the campaign silently infiltrates servers, using advanced techniques to mine cryptocurrency and perform proxyjacking – a tactic that abuses server resources to facilitate other cyber operations.

Let’s explore how Perfctl operates, the tactics it uses, the regions and sectors it targets, and, most importantly, what actions security teams can take to defend against this significant threat.

Overview of the Perfctl Campaign

Perfctl is particularly dangerous due to its ability to evade detection. Unlike many traditional forms of malware, it employs fileless infection techniques, masking itself within legitimate system processes and avoiding detection by conventional antivirus tools. By mimicking regular system files, it can quietly consume server resources for cryptocurrency mining and proxyjacking, impacting server performance while remaining undetected.

AI image made for Perfctl campaign exploiting Linux servers 

AI image made for Perfctl campaign exploiting Linux servers

This campaign has primarily affected industries with high computational demands, including cryptocurrency platforms and software development sectors. With its stealthy approach, Perfctl has become a formidable threat, highlighting the need for robust detection measures in Linux-based infrastructures.

Observed Countries and Sectors Affected by Perfctl

Perfctl’s reach extends globally, impacting critical industries and regions that rely heavily on Linux servers. Here are some of the main countries and sectors affected:

  • Key Regions: Perfctl has notably impacted the United States, Germany, and South Korea. These regions are heavily reliant on Linux-based servers, especially within cloud and enterprise settings, making them prime targets for itsl’s cryptomining and proxyjacking activities.
  • Targeted Sectors: Two primary sectors have been observed as targets:
    • Cryptocurrency and NFT Platforms: Given it’s cryptomining purpose, this sector has been a natural target. The malware exploits server resources for mining operations, often unnoticed due to the high computational demands of these environments.
    • Software Development and Publishing: The campaign’s propagation has been facilitated by its spread through developer forums and repositories. As open-source platforms often operate in Linux environments, this sector is particularly vulnerable to the canpaign’s tactics.

Indicators of Compromise (IoCs)

Detecting Perfctl hinges on identifying specific Indicators of Compromise (IoCs) tied to its operations. These IoCs provide valuable markers for security teams to flag suspicious activity and prevent further infiltration. Key IoCs associated include:

Category Indicator Description
IP Addresses 46.101.139.173 Associated with the command and control (C2) servers.
104.183.100.189 Used in malware’s proxyjacking network.
211.234.111.116 IP address for secondary C2 operations.
78.47.18.110 Observed in cryptomining traffic linked to it.
Hashes 656e22c65bf7c04d87b5afbe52b8d800 Hash of malicious payload.
da006a0b9b51d56fa3f9690cf204b99f A variation of the malware payload.
22e4a57ac560ebe1eff8957906589f4dd5934ee5 Associated with fileless infection techniques.
a6d3c6b6359ae660d855f978057aab1115b418ed Detected in cryptomining-related scripts.
Exploited Vulnerabilities CVE-2021-4034 Privilege escalation vulnerability leveraged by them and used to gain unauthorized access.
CVE-2023-33246 Allows unauthorized system takeover.

Monitoring these IoCs is crucial for detecting Perfctl’s presence on Linux servers and preventing further exploitation.

Tactics, Techniques, and Procedures (TTPs) Employed by Perfctl

Perfctl utilizes an array of tactics to infiltrate and maintain its foothold on Linux servers. Its methods are sophisticated and tailored to evade detection, making it one of the more resilient malware campaigns observed in recent years. The table below summarizes primary TTPs and corresponding mitigation techniques:

TTP ID Description Mitigation
Rootkit T1014 Uses rootkits to evade detection at the system level. Monitor drive modifications
Modify System Process T1543 Alters system processes, allowing it to run stealthily. Restrict command access
System Information Discovery T1082 Gathers OS and hardware details to tailor attacks. Monitor executed commands
Application Layer Protocol T1071 Hides malicious traffic within legitimate protocols. Filter and inspect network traffic
Impair Defenses T1562 Disables logging and security controls. Regular audits and permission checks
Masquerading T1036 Imitates system files to evade detection. Monitor process creation
Process Injection T1055 Injects code into legitimate processes, avoiding detection. Use endpoint security solutions
Remote Services T1021 Exploits remote services like SSH for lateral movement. Enforce multi-factor authentication
Elevation Control Mechanism Abuse T1548 Gains unauthorized high-level permissions. Regular OS configuration reviews

Remediation Steps for Perfctl Malware

To defend against Perfctl, a multi-layered approach combining monitoring, system hardening, and proactive threat intelligence is essential. Here are key remediation steps:

  1. Monitor Network Traffic and System Resources: Since the campaign’s activities include cryptomining and proxyjacking, look for unusual spikes in CPU and network usage.
  2. Enforce Strict Access Controls: Limit user access, particularly for administrative accounts. Implement multi-factor authentication for remote access to add an extra security layer.
  3. Regularly Patch and Update: Many vulnerabilities exploited by it have patches available. Timely updates reduce the likelihood of infection.
  4. Deploy Endpoint Detection and Response (EDR) Solutions: EDR tools with machine learning capabilities can detect Perfctl’s fileless techniques, alerting teams to suspicious process activities.
  5. Conduct Frequent Security Audits: Regularly review user permissions and system configurations to identify potential vulnerabilities that it could exploit.
  6. Engage in Threat Intelligence with SOCRadar: SOCRadar’s platform provides real-time visibility into emerging threats, including indicators, trends, and tactics used by campaigns like Perfctl. With continuous monitoring and alerting, organizations can respond swiftly, minimizing the impact of advanced malware.

By adopting these remediation steps, organizations can protect their Linux environments from the campaigns’s evasive tactics, preserving server performance and integrity.

Conclusion

Perfctl’s ongoing campaign against Linux servers is a stark reminder of the evolving sophistication in malware targeting server environments. As it continues to exploit vulnerabilities, particularly in regions with a heavy reliance on Linux, cybersecurity teams must stay vigilant. Leveraging SOCRadar’s Extended Threat Intelligence and implementing robust detection and mitigation measures will be essential in keeping Linux environments secure from this and similar advanced threats.