HeadCrab 2.0 discovered

B2B Cyber ​​Security ShortNews
Advertising

Share post

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog in the code provides clues and takes swipes at the defenders.

Last year, the then new malware HeadCrab caused trouble. Cybercriminals used the cutting-edge malware, which remains undetectable by agentless and traditional antivirus solutions, to compromise Redis servers. The criminals' campaign has been active since September 2021 and by the beginning of 2023 had already compromised 1.200 servers worldwide in order to misuse them for cryptojacking. Now the security experts from Aqua's Team Nautilus discovered a new version of the HeadCrab malware with new advanced mechanisms. Nautilus' ongoing investigation shows that the issue has not really improved since it was first disclosed last year. In fact, the criminals were able to almost double the number of infected Redis servers as part of their ongoing campaign.

Advertising

Insight into the mini blog

During the continuous investigation of HeadCrab, Team Nautilus experts came across an interesting component in the first version of the malware: a mini-blog. In a small text within the malware, the criminals discuss the campaign's strategies and specific references to associated events, explain their approach - and do not shy away from taking swipes at their Team Nautilus opponents. This blog has become a solid source of information about HeadCrab, providing insight directly from the attacker's perspective. In the first version of HeadCrab, discovered by Nautilus in early 2023, Aqua was mentioned in this mini-blog and linked to an earlier blog post that Nautilus had published. In this new version of the malware, the actors mention Nautilus again and address them directly with a statement: “…basically I agree: I mine cuz it almost doesn't harm human life and feelings (if done right), but its a parasitic and inefficient way of making $. In fact 80% of such systems are already mining, but this is not an excuse: ppl are motivated, and if kicked out, will mine somewhere else”.

More at Aquasec.com

 


About Aqua Security

Aqua Security is the largest pure cloud native security provider. Aqua gives its customers the freedom to innovate and accelerate their digital transformation. The Aqua platform provides prevention, detection, and response automation across the application lifecycle to secure the supply chain, cloud infrastructure, and ongoing workloads—regardless of where they are deployed.


 

Matching articles on the topic

Ransomware attacks are increasing sharply

After a period of calm, security experts are now reporting a sharp increase in ransomware attacks. Compared to February ➡ Read more

140 percent plus: Remote ransomware is increasing rapidly 

Latest findings from the field of remote ransomware: The research of the security specialists has already shown the enormous increase in remote encryption attacks by the end of 2023. ➡ Read more

Fines for violations of the GDPR

US companies and institutions are the most frequently targeted victims of cybersecurity attacks worldwide, followed by Germany and the UK. ➡ Read more

DeepSeek: Criminals use it to spread malware

According to experts, the rapid spread of generative AI applications is creating new opportunities for cybercriminals. The new AI chatbot DeepSeek has already ➡ Read more

Cyber ​​attacks via Powershell, exploits and PyInstaller

A threat analysis by G DATA CyberDefense shows that ransomware remains a major threat. At the same time, cybercriminals are increasingly using Powershell and ➡ Read more

Darknet: Over 2 million bank cards leaked

Experts estimate that data from 2,3 million bank cards has been published on the darknet in the last two years. Further analyses show, ➡ Read more

The threat landscape for operational technologies (OT) is growing

The OT threat landscape is growing: vulnerabilities in the supply chain, outdated infrastructure, difficulties in installing patches and gaps in response ➡ Read more

ToddyCat exploits vulnerability in ESET products

The Kaspersky SecureList security team has reported that the APT group ToddyCat is currently exploiting a vulnerability in ESET products. ➡ Read more