Chaos Malware Spreads to Linux Cloud Servers via Routers
CHAOS Malware Expands From Routers to Linux Cloud Servers
In a concerning development, the CHAOS malware, initially identified by Lumen’s Black Lotus Labs, has expanded its scope from targeting routers and edge devices to compromising Linux cloud servers.
- This shift marks a significant escalation in the threat landscape, as cloud servers often hold sensitive data and provide critical infrastructure for organizations.
- The attack begins with an HTTP request to the Hadoop deployment’s resource manager endpoint, which defines a new application and embeds a sequence of shell commands.
- These commands pull a CHAOS agent binary from an attacker-controlled server, set permissions, execute the binary, and delete it from disk.
- The CHAOS agent binary is served from a domain previously linked to Operation Silk Lure, a separate campaign that distributed the ValleyRAT remote access trojan through malicious job application attachments.
- The new CHAOS sample is a 64-bit ELF binary compiled for x86-64 Linux, marking a departure from earlier variants that targeted ARM, MIPS, and PowerPC architectures.
- The internal namespace was restructured, and several functions were rewritten or removed, including the SSH brute-forcing spreader and certain vulnerability exploitation routines previously inherited from Kaiji.
New Persistence Method
The malware establishes persistence using systemd and stores a keep-alive script on disk.
Proxy Functionality
The malware supports various protocols, including HTTP, TLS, TCP, UDP, and WebSocket, and features a SOCKS proxy function.
Circumstantial Evidence
While definitive attribution remains difficult, Darktrace’s analysis attributes suspected Chinese origin to CHAOS based on Chinese-language strings in the malware binary and zh-CN locale indicators.
Conclusion
Organizations must prioritize proper security configurations and continuous monitoring to protect themselves against this evolving threat.