Researchers from Russian antivirus vendor Dr. Web have found a new type of Linux malware that infects Raspberry Pi computers. The malware is called Linux.MulDrop.14. and it’s actively distributed since May this year.
The malware scans for Raspberry Pi devices that are accessible through SSH port 22. When it has found a victim it tries to login using the default username and password.
Doctor Web security researchers have examined two malicious programs for Linux. One of them installs a cryptocurrency-mining application on the devices it infects, and the other runs a proxy server. The first of the two was added to the Dr.Web virus databases under the name Linux.MulDrop.14. This malicious program attacks only Raspberry Pi minicomputers. Criminals started distributing Linux.MulDrop.14 in the second half of May.
The Trojan is a script that contains a compressed and encrypted application designed to mine cryptocurrency. Linux.MulDrop.14 changes the password on the devices it infects, unpacks and launches a miner, and then, in an infinite loop, starts searching for network nodes with an open port 22. After establishing a connection with them via the SSH protocol, the Trojan attempts to run a copy of itself on them. The other Trojan was named Linux.ProxyM. Attacks involving this Trojan have been noted since February 2017 but peaked in late May. The below chart shows how many Linux.ProxyM attacks Doctor Web specialists have pinpointed: graph #drweb A significant portion of the attacked IP addresses is located in Russia. In second place is China, and in third place—Taiwan.
ProxyM attacks have been launched: graph #drweb The Trojan uses a special range of methods to detect honeypots—special decoy servers used by digital security specialists to examine malicious software. Once launched, it connects to its command and control server and, after getting confirmation from it, runs a SOCKS proxy server on the infected device. Cybercriminals can use this Trojan to ensure that they remain anonymous online. Both of these Trojans are successfully detected and removed by Dr.Web products for Linux, and, therefore, they pose no threat to our users.