Description: Microsoft’s Threat Intelligence Centre (MSTIC) has published the technical methods and activities relating to a Russian group tracked as SEABORGIUM. The blog details how the threat…
Affected Systems: Linux, cloud networks and applications.
Date Discovered: New campaigns to expand the botnet from the gang have been seen running this month (July 2022), however, their botnet has existed since roughly 2021.
The 8220 Gang, which has been in operation for several years, has been spotted recently operating a massive surge in operations to bring its botnet up to an estimated size of 30,000 hosts.
According to SentinelOne “Victims of 8220 Gang are typically, but not exclusively, users of cloud networks operating vulnerable and misconfigured Linux applications and services”. They added that victims using cloud-based infrastructure were often infected via publicly available hosts running Apache WebLogic, Docker, Confluence, and Redis.
Once infected, devices have a cryptocurrency miner known as PwnRig installed and executed.
As many of the hosts of this botnet are infected via known vulnerabilities, one of the best preventions is to keep all services regularly updated and to have a firewall and antivirus running on your system.
Watching out for tell-tale signs of a cryptominer on your systems, such as a significant drop in performance or reduced battery life, can help you quickly detect if a cryptominer has taken place on your system.
Indicators of compromise for this botnet can be found here.
SentinelOne Blog – https://www.sentinelone.com/blog/from-the-front-lines-8220-gang-massively-expands-cloud-botnet-to-30000-infected-hosts/ – Posted July 18th
Hacker News – https://thehackernews.com/2022/07/this-cloud-botnet-has-hijacked-30000.html – Posted July 20th