By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking
Tech News

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

By Viral Trending Content 3 Min Read
Share
SHARE

Oct 03, 2024Ravie LakshmananLinux / Malware

Cryptocurrency Mining and Proxyjacking

Misconfigured and vulnerable Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking software.

“Perfctl is particularly elusive and persistent, employing several sophisticated techniques,” Aqua security researchers Assaf Morag and Idan Revivo said in a report shared with The Hacker News.

“When a new user logs into the server, it immediately stops all ‘noisy’ activities, lying dormant until the server is idle again. After execution, it deletes its binary and continues to run quietly in the background as a service.”

It’s worth noting that some aspects of the campaign were disclosed last month by Cado Security, which detailed an activity cluster that targets internet-exposed Selenium Grid instances with both cryptocurrency mining and proxyjacking software.

Specifically, the fileless perfctl malware has been found to exploit a security flaw in Polkit (CVE-2021-4043, aka PwnKit) to escalate privileges to root and drop a miner called perfcc.

Cybersecurity

The reason behind the name “perfctl” appears to be a deliberate effort to evade detection and blend in with legitimate system processes, as “perf” refers to a Linux performance monitoring tool and “ctl” is a commonly used suffix that signifies control in various command-line tools, such as systemctl, timedatectl, and rabbitmqctl.

The attack chain, as observed by the cloud security firm against its honeypot servers, involves breaching Linux servers by exploiting a vulnerable Apache RocketMQ instance to deliver a payload named “httpd.”

Cryptocurrency Mining and Proxyjacking

Once executed, it copies itself to a new location in the “/tmp” directory, runs the new binary, terminates the original process, and deletes the initial binary in an attempt to cover its tracks.

Besides copying itself to other locations and giving itself seemingly innocuous names, the malware is engineered to drop a rootkit for defense evasion and the miner payload. Some instances also entail the retrieval and execution of proxyjacking software from a remote server.

To mitigate the risk posed by perfctl, it’s recommended to keep systems and all software up-to-date, restrict file execution, disable unused services, enforce network segmentation, and implement Role-Based Access Control (RBAC) to limit access to critical files.

“To detect perfctl malware, you look for unusual spikes in CPU usage, or system slowdown if the rootkit has been deployed on your server,” the researchers said. “These may indicate crypto mining activities, especially during idle times.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Gemini 3 Flash vs Pro : Lower Latency and Costs

TruthScan vs. BrandWell: Which Should Be Your AI Image Detector?

AI adoption with API readiness platform Jentic 

Terrifying New Photos Emerge From the Jeffrey Epstein Estate

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

TAGGED: Cloud security, Cryptomining, Cyber Security, Cybersecurity, Internet, Linux, Malware, Proxyjacking, rootkit, server security, threat detection
Share This Article
Facebook Twitter Copy Link
Previous Article Bitcoin decentralization is a matter of national security — Auradine CEO
Next Article When I look for dividend shares to buy, should I just go for the biggest yields?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Gemini 3 Flash vs Pro : Lower Latency and Costs
Tech News
US Senate confirms pro-crypto Selig to lead CFTC, Hill to head FDIC
Crypto
The Game Awards 2025 Sets New Record With 171 Million Concurrent Live Viewers
Gaming News
Crypto Crime Escalates: Chainalysis Data Shows Over $3.4 Billion Stolen This Year
Crypto
TruthScan vs. BrandWell: Which Should Be Your AI Image Detector?
Tech News
The fear of being perceived
Sports
EU agrees €90bn loan to Ukraine after frozen Russian asset plan fails
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Gemini 3 Flash vs Pro : Lower Latency and Costs

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Gemini 3 Flash vs Pro : Lower Latency and Costs
December 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?