• Home
  • Privacy Policy
  • Terms and Conditions
  • DMCA
  • Disclaimer
  • Contact us
Friday, June 13, 2025
No Result
View All Result
NEWSLETTER defal
Lebanon Hub
NEWSLETTER
  • Home – Lebanon hub
    • About us
    • Radio & Live Hosting
      • Home
      • Podcast
      • About us
      • Contact us
  • Blog
    • Submit Blog
  • News
    • International
      • Lebanon
      • Australia
      • Sports
      • Tech
      • Cyber Security
      • Music
      • Celebrity
      • TV
      • Movies
    • Gaming
      • Reviews
      • XBOX
      • PlayStation
      • PC
      • Mobile
      • New Released
      • Popular
    • Cryptocurrency
      • Blockchain
      • Bitcoin
      • Altcoin
      • Exchange
      • Startups
      • Ethereum
      • Litecoin
  • Business
    • Business Dashboard
    • Add New Business
  • Events
    • Event Dashboard
  • Apply Job
    • All Jobs
    • All Resumes
  • Contact us
  • Sign in
  • Sign up
  • Home – Lebanon hub
    • About us
    • Radio & Live Hosting
      • Home
      • Podcast
      • About us
      • Contact us
  • Blog
    • Submit Blog
  • News
    • International
      • Lebanon
      • Australia
      • Sports
      • Tech
      • Cyber Security
      • Music
      • Celebrity
      • TV
      • Movies
    • Gaming
      • Reviews
      • XBOX
      • PlayStation
      • PC
      • Mobile
      • New Released
      • Popular
    • Cryptocurrency
      • Blockchain
      • Bitcoin
      • Altcoin
      • Exchange
      • Startups
      • Ethereum
      • Litecoin
  • Business
    • Business Dashboard
    • Add New Business
  • Events
    • Event Dashboard
  • Apply Job
    • All Jobs
    • All Resumes
  • Contact us
  • Sign in
  • Sign up
No Result
View All Result
Lebanon Hub
No Result
View All Result

Attackers deploy rootkits on misconfigured Apache Hadoop and Flink servers

January 11, 2024
in Cyber Security
0
Home Cyber Security
0
VIEWS
Share on FacebookShare on Twitter



From rootkits to cryptomining

Within the assault chain in opposition to Hadoop, the attackers first exploit the misconfiguration to create a brand new utility on the cluster and allocate computing assets to it. Within the utility container configuration, they put a sequence of shell instructions that use the curl command-line software to obtain a binary known as “dca” from an attacker-controlled server contained in the /tmp listing after which execute it. A subsequent request to Hadoop YARN will execute the newly deployed utility and subsequently the shell instructions.

Dca is a Linux-native ELF binary that serves as a malware downloader. Its major objective is to obtain and set up two different rootkits and to drop one other binary file known as tmp on disk. It additionally units a crontab job to execute a script known as dca.sh to make sure persistence on the system. The tmp binary that’s bundled into dca itself is a Monero cryptocurrency mining program, whereas the 2 rootkits, known as initrc.so and pthread.so, are used to cover the dca.sh script and tmp file on disk.

The IP handle that was used to focus on Aqua’s Hadoop honeypot was additionally used to focus on Flink, Redis, and Spring framework honeypots (by way of CVE-2022-22965). This means that the Hadoop assaults are seemingly half of a bigger operation that targets totally different applied sciences, like with TeamTNT’s operations prior to now. When probed by way of Shodan, the IP handle appeared to host an online server with a Java interface named Stage that’s seemingly a part of the Java payload implementation from the Metasploit Framework.

Mitigating the Apache Flink and Hadoop ResourceManager vulnerabilities

“To mitigate vulnerabilities in Apache Flink and Hadoop ResourceManager, particular methods should be applied,” Assaf Morag, a safety researcher at Aqua Safety, tells CSO by way of e mail. “For Apache Flink, it’s essential to safe the file add mechanism. This includes limiting the file add performance to authenticated and approved customers and implementing checks on the forms of recordsdata being uploaded to make sure they’re legit and secure. Measures like file dimension limits and file kind restrictions might be notably efficient.”

In the meantime, Hadoop ResourceManager must have authentication and authorization configured for API entry. Attainable choices embody integration with Kerberos — a standard selection for Hadoop environments — LDAP or different supported enterprise consumer authentication programs.

“Moreover, establishing entry management lists (ACLs) or integrating with role-based entry management (RBAC) programs might be efficient for authorization configuration, a function natively supported by Hadoop for numerous companies and operations,” Morag says. It’s additionally really helpful to contemplate deploying agent-based safety options for containers that monitor the setting and may detect cryptominers, rootkits, obfuscated, or packed binaries and different suspicious runtime behaviors.



Source link

Tags: ApacheattackersDeployFlinkHadoopMisconfiguredrootkitsservers
Next Post
Best Alienware Deals: Gaming PCs, Laptops, and Monitors

Best Alienware Deals: Gaming PCs, Laptops, and Monitors

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Beirut, LB
14°
Cloudy / Wind
05:4017:50 EET
Feels like: 13°C
Wind: 34km/h SW
Humidity: 65%
Pressure: 1012.19mbar
UV index: 0
FriSatSun
14°C / 9°C
16°C / 11°C
18°C / 12°C
powered by Weather Atlas

Recent News

PS5 Finally Has More Monthly Players Than PS4

PS5 Finally Has More Monthly Players Than PS4

June 13, 2025
Batman Begins 20 Years Later: Ranking Nolan Trilogy Characters

Batman Begins 20 Years Later: Ranking Nolan Trilogy Characters

June 13, 2025
Apple Games and the future of iOS gaming

Apple Games and the future of iOS gaming

June 13, 2025
Life Uncut’s Brittany Hockley and Ben Siegrist’s 00 wedding cake disaster

Life Uncut’s Brittany Hockley and Ben Siegrist’s $1000 wedding cake disaster

June 13, 2025
AFL round 14: Hawks vs Crows live updates — blog, scores and stats from Launceston

AFL round 14: Hawks vs Crows live updates — blog, scores and stats from Launceston

June 13, 2025
Celtic given permission to speak to 16-goal star who is available for £2m

Celtic given permission to speak to 16-goal star who is available for £2m

June 13, 2025
Trump administration throws wrench into  billion broadband rollout

Trump administration throws wrench into $42 billion broadband rollout

June 13, 2025
Virtuelle Maschine als Tarnkappe – Sophos News

Virtuelle Maschine als Tarnkappe – Sophos News

June 13, 2025
Lebanon Hub

Get the Latest Lebanon News and world News on LebanonHub.com. Local News, Sports, Technology, Music, Celebrity, Gaming News and Cryptocurrency Updates.

Category

  • Altcoin
  • Australia
  • Bitcoin
  • Blockchain
  • Celebrity
  • Cyber Security
  • Ethereum
  • Exchange
  • Litecoin
  • Local News
  • Mobile
  • Movies
  • Music
  • New Released
  • PC
  • PlayStation
  • Popular
  • Reviews
  • Sports
  • Startups
  • Technology
  • TV
  • XBOX

Recent News

PS5 Finally Has More Monthly Players Than PS4

PS5 Finally Has More Monthly Players Than PS4

June 13, 2025
Batman Begins 20 Years Later: Ranking Nolan Trilogy Characters

Batman Begins 20 Years Later: Ranking Nolan Trilogy Characters

June 13, 2025
  • Home
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2022 - Lebanon Hub.

No Result
View All Result
  • Home – Lebanon hub
    • About us
    • Radio & Live Hosting
      • Home
      • Podcast
      • About us
      • Contact us
  • Blog
    • Submit Blog
  • News
    • International
      • Lebanon
      • Australia
      • Sports
      • Tech
      • Cyber Security
      • Music
      • Celebrity
      • TV
      • Movies
    • Gaming
      • Reviews
      • XBOX
      • PlayStation
      • PC
      • Mobile
      • New Released
      • Popular
    • Cryptocurrency
      • Blockchain
      • Bitcoin
      • Altcoin
      • Exchange
      • Startups
      • Ethereum
      • Litecoin
  • Business
    • Business Dashboard
    • Add New Business
  • Events
    • Event Dashboard
  • Apply Job
    • All Jobs
    • All Resumes
  • Contact us
  • Sign in
  • Sign up

Copyright © 2022 - Lebanon Hub.