Chaos Malware Spreads to Linux Cloud Servers via Routers

Chaos-Malware-Spreads-to-Linux-Cloud-Servers-via-Routers

CHAOS Malware Expands From Routers to Linux Cloud Servers

In a concerning development, the CHAOS malware, initially identified by Lumen’s Black Lotus Labs, has expanded its scope from targeting routers and edge devices to compromising Linux cloud servers.

  • This shift marks a significant escalation in the threat landscape, as cloud servers often hold sensitive data and provide critical infrastructure for organizations.
  • The attack begins with an HTTP request to the Hadoop deployment’s resource manager endpoint, which defines a new application and embeds a sequence of shell commands.
  • These commands pull a CHAOS agent binary from an attacker-controlled server, set permissions, execute the binary, and delete it from disk.
  • The CHAOS agent binary is served from a domain previously linked to Operation Silk Lure, a separate campaign that distributed the ValleyRAT remote access trojan through malicious job application attachments.
  • The new CHAOS sample is a 64-bit ELF binary compiled for x86-64 Linux, marking a departure from earlier variants that targeted ARM, MIPS, and PowerPC architectures.
  • The internal namespace was restructured, and several functions were rewritten or removed, including the SSH brute-forcing spreader and certain vulnerability exploitation routines previously inherited from Kaiji.

New Persistence Method

The malware establishes persistence using systemd and stores a keep-alive script on disk.

Proxy Functionality

The malware supports various protocols, including HTTP, TLS, TCP, UDP, and WebSocket, and features a SOCKS proxy function.

Circumstantial Evidence

While definitive attribution remains difficult, Darktrace’s analysis attributes suspected Chinese origin to CHAOS based on Chinese-language strings in the malware binary and zh-CN locale indicators.

According to Darktrace’s research, the expansion of CHAOS malware from routers to Linux cloud servers poses a significant threat to organizations running cloud workloads.

Conclusion

Organizations must prioritize proper security configurations and continuous monitoring to protect themselves against this evolving threat.



Blog Image

About Author

en_USEnglish