New Xbash malware is a ransomware and cryptocurrency mining double-threat

Xbash deletes databases on Linux and mines cryptocurrency coins on Windows

hacking and ransomware

A new strain of composite malware has been discovered that is capable of delivering a ransomware payload and cryptocurrency mining exploits, against both Linux and Microsoft Windows servers.

Dubbed Xbash by security experts at Palo Alto Networks' Unit 42, the malware is believed to be tied to Chinese threat actors Iron Group. The collective has previously been connected to a number of ransomware attacks, sometimes under the name Roche'.

According to Unit 42, the malware also has self-propagating capabilities and worm-like characteristics, similar to the WannaCry strain that wreaked havoc on NHS systems in the summer of 2017. Essentially, the strain is being treated as an amalgamation of different malware types, capable of throwing a number of threats at a target at once.

The malware is capable of adapting the style of attack it uses depending on whether Linux or Windows is being targeted. On the former, Xbash will focus on destroying data and launching ransomware, whereas on the latter the malware will execute a cryptocurrency coinminer.

Xbash, which was built using Python, infects systems by targeting weak passwords and specific vulnerabilities, then at least on Linux deletes databases including MySQL, PostgreSQL and MongoDB. It displays a ransom note, although the researchers say the malware does not seem to contain functionality to recover deleted databases.

Advertisement - Article continues below
Advertisement - Article continues below

"We have discovered four different versions of Xbash so far," Unit 42 wrote. "Code and timestamp differences among these versions show that it's still under active development."

The researchers have observed 48 incoming transactions to the Bitcoin wallet used by the malware, amounting to 0.964 bitcoins. At the time of writing, that equates to around 4,700.

The malware is notable for combining botnet, ransomware and coinmining capabilities as well as its ability to discern operating system.

More technical details can be found on Unit 42's blog, which advises organisations to protect themselves by using strong passwords, keeping on top of security updates and implementing endpoint security on Microsoft Windows and Linux systems.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now



Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019

Best free malware removal tools 2019

23 Dec 2019

Best antivirus for Windows 10

3 Sep 2019

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
data breaches

Misconfigured security command exposes 250 million Microsoft customer records

23 Jan 2020
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020

Boris Johnson accused of doing "a bit of a runner" from Huawei 5G questions

27 Jan 2020