Thousands of Linux systems infected by "perfctl" malware since 2021
(arstechnica.com)
from SuperFola@programming.dev to linux@lemmy.ml on 04 Oct 2024 09:32
https://programming.dev/post/20187879
from SuperFola@programming.dev to linux@lemmy.ml on 04 Oct 2024 09:32
https://programming.dev/post/20187879
TLDR: perfctl is a crypto mining and proxy jacking malware that exploits about 20’000 common missconfigurations to install itself on Linux servers. Mostly using a 10/10 CVE on Apache RocketMQ.
It is very persistent and can reinstall itself even when you have deleted all the perfctl and perfcc files. It hides itself by removing logs, network packets, and stopping all activity once you login to the machine.
Monitoring cpu usage using tools (I use net data on my server) can help identify infections (100% cpu usage when « idle »).
threaded - newest
OK so you just need to stay logged in - Solved :)
tmux
and a<ctrl>-<b><d>
- done!…Me avoiding responsibilities…
There, that should fix it.
You say that, but I always leave screen sessions open
Honestly, if true, it’s so insidious
Maybe not related but I had an issie with wireplumber where it would suddenly take up any free CPU resources and use them up, jacking up my cpu usage up to crazy high numbers, often to 100% at times where the expected cpu usage would be at 20% at most.
I haven’t experienced this in the last week or so, so maybe it was fixed in an update? I’m on Fedora, btw. I just wanted to share, so I can find out if anyone else had the same issue.
.
Sounds pretty scary to me. The thing has full control over your computer (if infected) and is nearly undetectable.
.
So, is it a fairly decent antivirus mixed in with all the malware?
There can only be one.
There can only be… NONE!
Sounds like Windows Defender
Surely y’all have monitoring and alerts for excessive cpu load already?
On my own server at home, yes. Because that’s important for me to know what’s going on and not discover something by chance weeks later.
I will never understand people using 3rdparty MQ and RPC implementations. What a a PR for rocketMQ right here.
You can and you should implement your communication protocols, most of the time 3rdparties are very wasteful and a security liability. I like ZeroMQ (zeromq.org), they have amazing tech guides (zguide.zeromq.org). I still mostly do my own code.
I may have trust issues but sockets are not THAT hard, they’re just amzaingly frustrating to debug, not as much as debuging 3rdparty code.