Security
Headlines
HeadlinesLatestCVEs

Headline

Years Long Linux Cryptominer Spotted Using Legit Sites to Spread Malware

Cryptominer campaign runs for years using legit sites to spread malware, targeting Linux systems through known bugs and avoiding detection.

HackRead
#vulnerability#web#windows#linux#apache#git#ssl

A recent investigation by VulnCheck has exposed a cryptomining campaign that has been running unnoticed for years. The threat actor behind this operation, using the Linuxsys miner, has been targeting vulnerable systems since at least 2021, maintaining a consistent strategy that relies heavily on compromised legitimate websites to distribute malware.

What makes this campaign more difficult to detect is the attacker’s use of real websites as malware delivery channels. Instead of hosting payloads on suspicious domains, they compromise third-party sites with valid SSL certificates and plant their download links there. This not only helps them bypass many security filters but also keeps their core infrastructure (like the downloader site repositorylinux.org) at a distance from the actual malware files.

Between July 1 and July 16 this year, VulnCheck analysts spotted repeated exploit attempts from the IP address 103.193.177.152 against a canary Apache 2.4.49 instance. These attempts were tied to the CVE-2021-41773 vulnerability. While this particular vulnerability isn’t new and continues to be a popular target, the entity exploiting it stood out.

The attackers used a simple script called linux.sh, which pulls down both the configuration file and the Linuxsys binary from a list of five compromised websites. These include domains like prepstarcenter.com, wisecode.it, and dodoma.shop, all of which are otherwise ordinary-looking sites.

According to VulnCheck’s blog post shared with Hackread.com ahead of publishing on Wednesday, the list wasn’t random. This gave the attacker backup options if one site got taken down or stopped working, so the malware could still be delivered without interruption.

The miner configuration file retrieved from these sites points to hashvault.pro as the mining pool and identifies the wallet associated with the operation. That wallet has been receiving small payouts since January 2025, averaging around 0.024 XMR per day, about $8.

While $8 sounds insignificant, the operation isn’t necessarily about high revenue. The consistency and duration suggest other goals, or possibly more mining activity elsewhere that hasn’t been observed yet.

Tracing Linuxsys back in time, it first appeared in 2021 in a blog post by Hal Pomeranz, a highly respected expert in Linux and Unix digital forensics, analysing the exploitation of the same CVE. Since then, it has been tied to multiple vulnerabilities through reports by several cybersecurity firms. These include recent CVEs like 2023-22527, 2023-34960, and 2024-36401.

All of these security vulnerabilities were exploited using a n-day vulnerability exploitation, content staging on compromised web infrastructure, and persistent mining operations. An n-day vulnerability is a security bug that’s already known and usually has a fix available. The name just means the flaw has been public for a certain number of days, with ‘n’ being how many days it’s been since the issue was first made public or patched.

There’s also some evidence that the operation isn’t limited to Linux. Two Windows executables, nssm.exe and winsys.exe, were found on the same compromised hosts. While VulnCheck didn’t observe these in action, their presence suggests a broader scope than just Linux systems.

What’s kept this campaign so low-profile is likely a combination of careful targeting and deliberate avoidance of honeypots. VulnCheck notes that the attacker appears to favour high-interaction environments, meaning typical bait servers often miss this activity entirely. This cautious approach has likely helped the campaign avoid attracting too much attention despite being active for years.

VulnCheck has released Suricata and Snort rules that detect exploit attempts for all known associated CVEs. Meanwhile, indicators of compromise include IPs, URLs, and file hashes related to the attack. They also provided detection rules that security teams can use to identify DNS queries and HTTP traffic associated with the downloader and initial payload scripts.

Related news

Gentoo Linux Security Advisory 202208-20

Gentoo Linux Security Advisory 202208-20 - Multiple vulnerabilities have been discovered in Apache Webserver, the worst of which could result in remote code execution. Versions less than 2.4.54 are affected.

CVE-2022-32263: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 28.1 allows remote attackers to trigger a software abort via G.719.

CVE-2022-27928: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.

CVE-2022-27929: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.

CVE-2022-26654: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.

CVE-2022-27935: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.

CVE-2022-25357: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.

CVE-2022-27934: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.

CVE-2022-22721: Apache HTTP Server 2.4 vulnerabilities

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVE-2021-44790: Apache HTTP Server 2.4 vulnerabilities

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

HackRead: Latest News

PoisonSeed Tricking Users Into Bypassing FIDO Keys With QR Codes