Cado Security Labs observed a 600x spike in P2Pinfect activity, with rapid variant updates and expanding geographic reach across major cloud providers. The analysis covers how the botnet infects Redis on Linux hosts, persists via cron and SSH mechanisms, and scales its peer network across continents. #P2Pinfect #Redis #Alibaba #AWS #Tencent
Keypoints
- P2Pinfect traffic increased 600x since August 28 and there was a 12.3% traffic rise in the week before publication.
- The botnet targets Redis-capable Linux cloud instances and has evolved with multiple payload variants and a self-update capability.
-
MITRE Techniques
- [T1059] Command and Scripting Interpreter โ The attacker delivers a malicious Redis module to the target, allowing arbitrary shell commands to be run. Quote: โThe attacker delivers a malicious Redis module to the target, allowing arbitrary shell commands to be run.โ
- [T1105] Ingress Tool Transfer โ The malware retrieves the primary payload from a designated downloader node via /dev/tcp, then writes and executes it. Quote: โThe command utilizes the /dev/tcp device file to retrieve the primary payload from a designated downloader node (referred to as IA Downloader)โฆโ
- [T1046] Network Service Scanning โ After infection, each peer scans the local network and the Internet for exposed Redis and SSH servers. Quote: โafter successful infection, each peer will conduct scanning of both the local network and the Internet for exposed Redis and SSH servers.โ
- [T1021.004] Remote Services (SSH) โ P2Pinfect propagates via SSH brutes and credential lists to gain access to new hosts. Quote: โThe malware also has the ability to propagate via SSH, and includes a list of username/password pairs to assist with SSH brute-forcing.โ
- [T1053] Scheduled Task/Job โ Cron persistence is added, with cron writing to /etc/crontab and /var/spool/cron, launching the main payload periodically. Quote: โcron job launches the primary payload (linux) at every 30th minute of the hour and passes in an encoded argument.โ
- [T1098] SSH Authorized Keys (Persistence) โ New variants overwrite SSH authorized_keys with attacker-controlled keys to block logins and ensure persistence. Quote: โRecent versions of P2Pinfect overwrite existing SSH authorized_keys files with an attacker-controlled SSH key.โ
Indicators of Compromise
- [SHA256] Linux binary samples โ 6d0e4c03cf4731b9b05c3e575a92db9beabccf243263d703c7b332597c8ed591, 8798513436bd3817df839e974810fd3f9595393dafdaf4a67b381c30689273f8
- [SHA256] Bash payload โ 54f4f4af8023b34e10922edc703d2b1409165407942232c93677743312e19ab4
- [Cron] Cron job โ โ*/30 * * * * user /tmp/linux โ
- [File Path] Temporary files used โ /tmp/.raimi, /tmp/bash
- [IP] Observed compromised hosts โ 124.225.78.48, 103.101.153.27