"A new, financially motivated operation, "LABRAT," has been observed exploiting a flaw in GitLab for a Cryptojacking and Proxyjacking campaign."
Nimnaka Kumaradasa
UI UX Designer | Web Developer | Writer | Artist | Software | Cyber Enthusiast
Executive Summary:
“CVE-2021-22205 (CVSS 10)”, a now patched vulnerability in GitLab was exploited by hackers to gain initial access to a container and carryout “cryptojacking” and “proxyjacking” activities. This vulnerability causes GitLab to not being able to properly validate image files that were passed to a file parser which resulted in a remote command execution. Once the attacker had access to the server, they downloaded a malicious script from the C2 server. This script allowed the attacker to achieve persistence, evade defenses, and perform lateral movement through the following actions,
Attackers were also using “trycloudflare[.]com” to obfuscate their C2 location by creating subdomains as password-protected web server that hosted a malicious shell script. These scripts act as a file dropper and try to gain persistence on the victim network, and also pivot to additional systems if SSH credentials are discovered on the compromised system. The malicious actors were also observed to be downloading binaries related to malicious activity directly from a private GitLab repository. Another attack included a “Solr” server, where the attackers downloaded a “pwnkit” (CVE-2021-4034) binary from the private repository to elevate privileges. The attackers used GSocket to create a backdoor in order to maintain persistence by running a script with the following steps,
The utilization of undetected signature-based tools, sophisticated and stealthy cross-platform malware, command and control (C2) tools which bypassed firewalls, and kernel-based rootkits made it harder to detect the malicious activities carried out by the attackers.
IoC{Indicators of Compromise}
Hash
URLs
领英推荐
IPs
Domain
Affected Products
Mitigation Strategies:
Additional Information
References:
Hernández, M. (2023b). LABRAT: Stealthy Cryptojacking and proxyjacking campaign targeting GitLab. Sysdig. https://sysdig.com/blog/labrat-cryptojacking-proxyjacking-campaign/?web_view=true
The Hacker News. (n.d.-b). New LABRAT campaign exploits GitLab flaw for cryptojacking and proxyjacking activities. https://thehackernews.com/2023/08/new-labrat-campaign-exploits-gitlab.html