A NEW TROJAN targeting Linux servers has been discovered in the wild, exploiting servers running the Redis NoSQL database to use them for bitcoin mining.
Up to 30,000 Redis servers may be vulnerable, largely because careless systems administrators have put them online without setting a password.
The Linux.Lady malware was discovered by Russian antivirus software vendor Dr Web and is, intriguingly, written using Google’s Go programming language, largely based on open source Go libraries hosted on GitHub.
The malware uses a more compact trojan called Linux.Downloader.196 to download the main payload after infection. Linux.Lady, once installed and running, sends basic information about the cracked system to the command-and-control (CC) server.
The next step in the infection process is a configuration file sent from the CC server to start the crypto-currency mining process for the benefit of the malware’s controllers. Linux.Lady is also self-propagating.
“This malware possesses the ability to collect information about an infected computer and transfer it to the CC server, download and launch a crypto-currency mining utility, and attack other computers on the network to install its own copy on them,” said the Dr Web advisory.
Once launched, the trojan checks the system for keys and terminates itself