Aqua Nautilus researchers uncover a stealthy attack targeting Apache Hadoop and Flink apps, using packers and rootkits to conceal malware and evade defenses. The operation abuses misconfigurations in Hadoop YARN and Flink unauthenticated RCE to deploy a downloader that fetches rootkits and a Monero cryptominer, with robust defense evasion and persistence techniques. #Hadoop #YARN #Flink #Monero #rootkit #dca #dcd #TeamTNT
Keypoints
- The attack targets Apache Hadoop and Flink by exploiting a misconfiguration in Hadoop YARN ResourceManager that allows unauthenticated app deployment.
- The main payload is a packed ELF binary named ‘dca’ that downloads two rootkits and a Monero miner to disk.
- The attackers use packing, symbol/string removal, and embedded payloads to evade analysis and hide components.
- Persistence is achieved by manipulating cron jobs to deploy the downloader and maintain access.
- The threat actor’s infrastructure involves specific IPs and a staging server, including domains like ns1.disponibletogether.com.
- The report maps multiple MITRE techniques (Initial Access, Execution, Persistence, Defense Evasion, Discovery, Impact) to describe the attack chain.
MITRE Techniques
- [T1190] Exploit Public-Facing Application – The attackers exploited a misconfiguration in Hadoop YARN ResourceManager, allowing unauthenticated users to create and run applications. [‘The YARN permits unauthenticated users to create and run applications.’]
- [T1059.004] Command and Scripting Interpreter: Unix Shell – The attacker executed arbitrary code via specially crafted HTTP requests to launch the new application. [‘requesting to launch the new application with the attacker’s command’]
- [T1053.003] Scheduled Task/Job: Cron – The threat actor deletes cron jobs and creates a cron job to establish persistence. [‘deleting all cron jobs and creating a cron job to establish persistence’]
- [T1027.002] Obfuscated Files or Information: Software Packing – The main payload ‘dca’ is packed with a BGP packer to obfuscate. [‘using BGP packer to pack and obfuscat the main payload the ‘dca’ ELF binary’]
- [T1027.008] Obfuscated Files or Information: Stripped Payloads – The ‘dca’ binary has symbols/strings removed to hinder analysis. [‘dca ELF binary symbols and strings were removed to make the analysis more difficult’]
- [T1027.009] Obfuscated Files or Information: Embedded Payloads – The Monero miner is embedded within the ‘dca’ ELF binary. [‘The Monero cryptominer is embedded withing the ‘dca’ ELF binary’]
- [T1222.002] File and Directory Permissions Modification – The attacker modifies permissions to execute the payload. [‘Linux File and Directory Permission Modification’]
- [T1014] Rootkit – The threat actor uses two Processhider rootkits to hide the cryptominer and shell commands. [‘Rootkit (T1014)’]
- [T1082] System Information Discovery – The attackers perform vCore and memory discovery during initial access. [‘conducting a vCore (virtual CPU cores) and memory discovery’]
- [T1496] Resource Hijacking – The Monero cryptominer deployment indicates cryptocurrency mining at the expense of resources. [‘Resource Hijacking (T1496)’]
Indicators of Compromise
- [IOC Type] IP address – 20[.]150[.]209[.]84, 185[.]196[.]9[.]190 (Scan/infect Hadoop; Download server)
- [IOC Type] IP address – 185[.]196[.]9[.]181 (Download server – Flink) and 185[.]196[.]9[.]190 (Download server – Hadoop)
- [IOC Type] Domain – ns1[.]disponibletogether[.]com (Mining address)
- [IOC Type] File (ASCII) – dca.sh MD5: 58794e43c039fe20281bf0777721c8ce (dca.sh download shell script), dcd.sh MD5: 94e0f679758facf683a217774e29c2b2
- [IOC Type] File (ELF) – dca MD5: 901ac649b47e0261d88f568f02c90412 (main payload, dca malware), dcd MD5: cebadcafee4ed6a69c64ab08496163d7
- [IOC Type] File (ELF) – tmp MD5: d37e385f2fa64173c44b001b40ce48a3 (XMRIG cryptominer)
- [IOC Type] File (SO) – pthread.so MD5: 0a100f6a07e7fd611553ef7c42f37f5a (Processhider rootkit), initrc.so MD5: 38d898459a3f530e2db083e1bb1e1524 (Processhider rootkit)
Read more: https://blog.aquasec.com/threat-alert-apache-applications-targeted-by-stealthy-attacker