b374k
v10
today : | at : | safemode : ON
> / home / facebook / twitter / exit /
name author perms com modified label

rTorrent flaw exploited in crypto-mining campaign Asylum rwxr-xr-x 0 5:49 PM

Filename rTorrent flaw exploited in crypto-mining campaign
Permission rw-r--r--
Author Asylum
Date and Time 5:49 PM
Label
Action
Researchers from F5 Networks Inc. have found that hackers are targeting a flaw in the popular rTorrent application to install crypto-mining software on computers running Unix-like operating systems. They have so far generated over $3,900.

This campaign exploits a previously undisclosed misconfiguration vulnerability and deploys a Monero (XMR) crypto-miner operation.

The attacks exploit XML-RPC, an rTorrent interface that uses XML and HTTP to access remote computers, and for which rTorrent doesn’t require any authentication. Shell commands can be executed directly on the OS rTorrent runs on.

The hackers identify the computers running RPC-enabled rTorrent apps on the internet and target them to install Monero, the digital coin mining software.

The malware downloaded doesn’t just run mining software but also scans for rival miners and removes them.

The vulnerabilities being exploited are in some respects similar to those reported through the Google Zero project in the BitTorrent client uTorrent. The difference lies in that the rTorrent flaw can be exploited without any user interaction rather than only by sites visited by the user.

The XML-RPC interface isn’t enabled by default and rTorrent recommends not using RPC over TCP sockets.

Below is an email rTorrent developer Jari Sundell wrote regarding the flaw:

There is no patch as the vulnerability is due to a lack of knowledge about what is exposed when enabling RPC functionality, rather than a fixable flaw in the code. It was always assumed, from my perspective, that the user would ensure they properly handled access restriction. No 'default behavior' for rpc is enabled by rtorrent, and using unix sockets for RPC is what I'm recommending. The failure in this case is perhaps that I've created a piece of software that is very flexible, yet not well enough documented that regular users understand all the pitfalls.

Currently, the hackers generate about $43 per day using this exploit and have already generated $3,900 combined.



via E Hacking News - Latest Hacker News and IT Security News rTorrent flaw exploited in crypto-mining campaign http://ift.tt/2oMpL9q

0 comments:

Post a Comment

 

Jayalah Indonesiaku © 2010 Hacker News
VB (Vio b374k) Template design by p4r46hcyb3rn3t