Sunday, November 9, 2025
HomeTechnologyCRYSTALRAY Hackers Use Network Mapping Tool to Infect Over 1,500 Victims

CRYSTALRAY Hackers Use Network Mapping Tool to Infect Over 1,500 Victims


July 15, 2024NewsroomSaaSSecurity/Vulnerabilities

Network Mapping Tools

A risk actor beforehand noticed utilizing an open-source community mapping software has considerably expanded its operations, infecting over 1,500 victims.

Sysdig, which tracks the cluster below the title CRYSTALRAY, stated there was a 10-fold spike in exercise, highlighting “excessive quantity scanning, exploitation of a number of vulnerabilities, a number of [open-source software] Security instruments.”

The important targets of the assaults are to gather and promote credentials, deploy cryptocurrency miners, and keep persistence within the sufferer’s setting.

Cybersecurity

Prominent among the many open-source packages utilized by risk actors is SSH-Snake, which was first launched in January 2024. It is described as a software that performs automated community traversal utilizing SSH personal keys found on techniques.

CRYSTALRAY’s software program exploits have been documented by cybersecurity companies in early February this yr, with the instruments deployed for lateral motion after exploiting identified safety flaws in publicly uncovered Apache ActiveMQ and Atlassian Confluence situations.

SSH-Snake developer Joshua Rogers instructed The Hacker News on the time that the software merely automates a course of that might in any other case need to be achieved manually, and urged firms to “uncover and remediate the assault vectors that exist.”

Network Mapping Tools

Other instruments utilized by attackers embody asn, zmap, httpx, nuclei to verify if a site is energetic or not and to provoke a scan for weak companies equivalent to Apache ActiveMQ, Apache RocketMQ, Atlassian Confluence, Laravel, Metabase, Openfire, Oracle WebLogic Server, Solr, and so on.

Cybersecurity

CRYSTALRAY weapons its preliminary foothold to carry out an in depth credential discovery course of that goes past traversing servers accessible by way of SSH. Persistent entry into compromised environments is achieved by means of a reputable command and management (C2) framework known as Sliver and a reverse shell supervisor code-named Platypus.

To additional extract financial worth from contaminated belongings, a cryptocurrency miner payload is delivered to take advantage of the sufferer’s sources for monetary achieve, whereas additionally taking steps to terminate any competing miners which will already be operating on the machine.

“CRYSTALRAY is ready to discover and extract credentials from weak techniques, which it might probably then promote on the black marketplace for 1000’s of {dollars},” stated Sysdig researcher Miguel Hernández. “The credentials on sale contain quite a lot of companies, together with cloud service suppliers and SaaS e-mail suppliers.”

Did you discover this text attention-grabbing? Follow us Twitter: To learn extra unique content material we publish, verify us out on LinkedIn.




Source hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular