New Linux Trojans installs crypto currency mining software on Raspberry Pi
Researchers from Russian antivirus vendor Dr. Web have found a new type of Linux malware that infects Raspberry Pi computers. The malware is called Linux.MulDrop.14. and it’s actively distributed since May this year.
The malware scans for Raspberry Pi devices that are accessible through SSH port 22. When it has found a victim it tries to login using the default username and password.
Doctor Web security researchers have examined two malicious programs for Linux. One of them installs a cryptocurrency-mining application on the devices it infects, and the other runs a proxy server. The first of the two was added to the Dr.Web virus databases under the name Linux.MulDrop.14. This malicious program attacks only Raspberry Pi minicomputers. Criminals started distributing Linux.MulDrop.14 in the second half of May.
The Trojan is a script that contains a compressed and encrypted application designed to mine cryptocurrency. Linux.MulDrop.14 changes the password on the devices it infects, unpacks and launches a miner, and then, in an infinite loop, starts searching for network nodes with an open port 22. After establishing a connection with them via the SSH protocol, the Trojan attempts to run a copy of itself on them. The other Trojan was named Linux.ProxyM. Attacks involving this Trojan have been noted since February 2017 but peaked in late May. The below chart shows how many Linux.ProxyM attacks Doctor Web specialists have pinpointed: graph #drweb A significant portion of the attacked IP addresses is located in Russia. In second place is China, and in third place—Taiwan.
ProxyM attacks have been launched: graph #drweb The Trojan uses a special range of methods to detect honeypots—special decoy servers used by digital security specialists to examine malicious software. Once launched, it connects to its command and control server and, after getting confirmation from it, runs a SOCKS proxy server on the infected device. Cybercriminals can use this Trojan to ensure that they remain anonymous online. Both of these Trojans are successfully detected and removed by Dr.Web products for Linux, and, therefore, they pose no threat to our users.
Senior Member
Posts: 7255
Joined: 2003-07-23
It's nice that they named it Linux. To avoid any confusion.... Default username and password? Does such a thing exist? Interesting read though. Thanks.
Senior Member
Posts: 4915
Joined: 2008-12-09
On the Raspberry Pi, yes. It's always User = rasberry, password = pi.
It's honestly pretty brilliant. Target linux newbies that have no idea of what they are doing.
Senior Member
Posts: 19558
Joined: 2010-04-21
On the Raspberry Pi, yes. It's always User = rasberry, password = pi.
Other way around I think, User - pi, Pass - raspberry
Senior Member
Posts: 3964
Joined: 2011-11-24
When you buy a router, it has a default user and password for the initial login. You are supposed to change it.
Many people don't. Or they think that just because it runs Linux, they're safe, not realizing that it doesn't matter what OS you run if everyone has the login password...
Member
Posts: 31
Joined: 2016-12-16
Thanks for the news, it’s interesting to know about Linux viruses (as a Linux user myself). But I don’t think many people who run an internet-accessible ssh server with the default login and password read guru3d