Rival cryptomining gangs warring over unsecure Linux servers

Pacha Group’s malware goes toe-to-toe with Rocke for maximum computing power to launch mining attacks

Image of a fighter getting ready for a boxing match

A cryptocurrency mining group is "aggressively" targeting a key rival as it attempts to gain a greater foothold on cloud-based environments as a platform for launching more effective attacks.

Researchers have learned that Pacha Group, discovered only in February, is targeting Linux servers on a broader scale, suggesting cloud-based environments are increasingly becoming a target for malicious actors.

But these cyber criminals are also targeting rival cryptocurrency mining groups; specifically channelling efforts into disrupting the operations of a similar collective known as Rocke Group. The latter is also known to target cloud environments.

The main malware infrastructure used by Pacha Group appears to be identical to previous campaigns, although there's a "distinguishable effort" to detect and mitigate Rocke Group implants, according to Intezer.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Rocke is one of the most prominent cryptocurrency mining outfits and has run a variety of campaigns in previous months, most recently targeting Linux servers with mutatable malware in January.

Pacha, by comparison, is smaller and newer, active since September 2018, but far more aggressive. Its malware strain, dubbed Linux.GreedyAntd, uses a variety of techniques to disable or eliminate other strains implanted by rival groups on infected servers. The wider aim is to gain the largest foothold of computing power possible for cryptomining activities.

"We have presented evidence that Pacha Group is targeting cloud-based environments and being especially aggressive towards Rocke Group," said security researcher Nacho Sanmillan.

"We have based this conclusion on the process blacklist used by Pacha Group and the newly added IP blacklist which contains Rocke Group correlated artefacts.

"We have also provided a YARA rule in order to detect Pacha Group's Linux.GreedyAntd implants based on reused code among the implants are attempting to displace each other."

Intezer researchers added that while threats to cloud infrastructure are increasing, detection rates of Linux-based malware remains low. The security industry, the firm added, must do more collectively to effectively mitigate these threats.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/operating-systems/microsoft-windows/354526/memes-and-viking-funerals-the-internet-reacts-to-the
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020
Visit/network-internet/broadband/354530/openreach-offers-free-full-fibre-installation-for-thousands-of
broadband

Openreach offers free full-fibre installation for thousands of homes

14 Jan 2020
Visit/security/vulnerability/354524/microsoft-to-patch-extraordinarily-serious-cryptographic-flaw
vulnerability

Microsoft to patch ‘extraordinarily serious’ cryptographic flaw

14 Jan 2020