Blog | G5 Cyber Security

Ongoing Autom Cryptomining Malware Attacks Using Upgraded Evasion Tactics

Researchers from DevSecOps and cloud security firm Aqua Security have been tracking the malware operation for the past three years. Initial attacks involved executing a malicious command upon running a vanilla image named “alpine:latest” that resulted in the download of a shell script named “autom.sh” The shell script initiates the attack sequence, enabling the adversary to create a new user account under the name “akay” and upgrade its privileges to a root user, using which arbitrary commands are run on the compromised machine with the goal of mining cryptocurrency.”]

Source: https://thehackernews.com/2021/12/ongoing-autom-cryptomining-malware.html

Exit mobile version