Original Article Text

Click to Toggle View

New PumaBot botnet brute forces SSH credentials to breach devices. A newly discovered Go-based Linux botnet malware named PumaBot is brute-forcing SSH credentials on embedded IoT devices to deploy malicious payloads. The targeted nature of PumaBot is also evident by the fact it targets specific IPs based on lists pulled from a command-and-control (C2) server instead of broader scanning of the internet. Targeting surveillance cams Darktrace documented PumaBot in a report providing an overview of the botnet's attack flow, indicators of compromise (IoCs), and detection rules. The malware receives a list of target IPs from its C2 (ssh.ddos-cc.org) and attempts to perform brute-force login attempts on port 22 for open SSH access. During this process, it checks for the presence of a "Pumatronix" string, which Darktrace believes could correspond to the targeting of surveillance and traffic camera systems by the vendor. Once the targets have been established, the malware receives credentials to test against them. If successful, it runs 'uname -a' to get environment information and verify the targeted device is not a honeypot. Next, it writes its main binary (jierui) to /lib/redis and installs a systemd service (redis.service) to secure persistence across device reboots. Finally, it injects its own SSH into the 'authorized_keys' file to maintain access, even in the case of a cleanup that removes the primary infection. Where the infection stays active, PumaBot can receive commands to attempt data exfiltration, introduce new payloads, or steal data useful in lateral movement. Example payloads seen by Darktrace include self-updating scripts, PAM rootkits that replace the legitimate 'pam_unix.so', and daemons (binary file "1"). The malicious PAM module harvests local and remote SSH login details and stores them in a text file (con.txt). The "watcher" binary (1) constantly looks for that text file and then exfiltrates it to the C2. After the exfiltration, the text file is wiped from the infected host to delete any traces of the malicious activity. The size and success of PumaBot are currently unknown, and Darktrace does not mention how extensive the target IP lists are. This new botnet malware stands out for launching targeted attacks that could open the way to deeper corporate network infiltration instead of using the infected IoTs directly for lower-grade cybercrime, such as distributed denial of service (DoS) attacks or proxying networks. To defend against botnet threats, upgrade IoTs to the latest available firmware version, change default credentials, put them behind firewalls, and keep them in separate networks isolated from valuable systems. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // PumaBot Targets IoT Devices, Brute-Forces SSH Credentials

A new Go-based Linux botnet, PumaBot, has been discovered specifically targeting IoT devices by brute-forcing SSH credentials.

PumaBot operates by receiving a list of targeted IPs from its command-and-control server and proceeds with brute-force attacks on port 22 to gain SSH access.

The malware is programmed to specifically look for the “Pumatronix” string during its operations, indicating a likely focus on surveillance and traffic camera systems.

Once access is gained, PumaBot verifies the legitimacy of the device, ensures persistence via systemd service installation, and manipulates 'authorized_keys' to maintain access.

The botnet has the capability to steal data, deploy additional malware, and execute commands from the control server, including data exfiltration of SSH credentials stored locally.

Security countermeasures recommended including upgrading IoT firmware, changing default credentials, using firewalls, and segregating IoT networks from critical systems.

The extent of PumaBot’s spread and its success rate are currently unreported, though its targeted approach suggests potential for significant impact on infected networks.