IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Alibaba ECS instances targeted in new cryptojacking campaign

Cyber criminals have been disabling security features in the cloud to mine for Monero

Hackers have been found attacking Alibaba Cloud Elastic Computing Service (ECS) instances to mine Monero cryptocurrency in a new cryptojacking campaign.

Security researchers at Trend Micro discovered cyber criminals disabling security features in cloud instances so that they could mine for cryptocurrency.

ECS instances come with a preinstalled security agent that hackers try to uninstall it upon compromise. Researchers said specific code in the malware created firewall rules to drop incoming packets from IP ranges belonging to internal Alibaba zones and regions. 

These default Alibaba ECS instances also provide root access. The problem here is these instances lack the different privilege levels found in other cloud providers. This means hackers who gain login credentials to access a target instance can do so via SSH without mounting an escalation of privilege attack beforehand.

“In this situation, the threat actor has the highest possible privilege upon compromise, including vulnerability exploitation, any misconfiguration issue, weak credentials or data leakage,” said researchers.

This enables advanced payloads, such as kernel module rootkits and achieving persistence via running system services to be deployed. “Given this feature, it comes as no surprise that multiple threat actors target Alibaba Cloud ECS simply by inserting a code snippet for removing software found only in Alibaba ECS,” they added.

Related Resource

Leveraging the cloud without relinquishing control

Your data. Their cloud.

Man in blue shirt talking on phone with a cloud drawn in the background Free download

Researchers said that when cryptojacking malware is running inside Alibaba ECS, the security agent installed will send a notification of a malicious script running. It is then up to the user to prevent ongoing infection and malicious activities. Researchers said it is always the responsibility of the user to prevent this infection from happening in the first place. 

“Despite detection, the security agent fails to clean the running compromise and gets disabled,” they added. “Looking at another malware sample shows that the security agent was also uninstalled before it could trigger an alert for compromise.”

Once compromised, the malware installs an XMRig to mine for Monero. 

Researchers said it was important to note that Alibaba ECS has an auto-scaling feature to automatically adjust computing resources based on the volume of user requests. This means hackers can also scale up cryptomining and with users bearing the costs.

“By the time the billing arrives to the unwitting organization or user, the cryptominer has likely already incurred additional costs. Additionally, the legitimate subscribers have to manually remove the infection to clean the infrastructure of the compromise,” warned researchers.

Featured Resources

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

The Total Economic Impact™ of IBM robotic process automation

Cost savings and business benefits enabled by robotic process automation

Free Download

Multi-cloud data integration for data leaders

A holistic data-fabric approach to multi-cloud integration

Free Download

MLOps and trustworthy AI for data leaders

A data fabric approach to MLOps and trustworthy AI

Free Download

Recommended

2022 IBM's Security X-Force cloud threat landscape report
Whitepaper

2022 IBM's Security X-Force cloud threat landscape report

22 Nov 2022
2022 Magic quadrant for Security Information and Event Management (SIEM)
Whitepaper

2022 Magic quadrant for Security Information and Event Management (SIEM)

22 Nov 2022
Seven realities facing SMBs as they enter a future of increased cyber threats
Whitepaper

Seven realities facing SMBs as they enter a future of increased cyber threats

21 Nov 2022
Revealed: The top 200 most common passwords of 2022
cyber security

Revealed: The top 200 most common passwords of 2022

17 Nov 2022

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation
cyber crime

Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation

25 Nov 2022