ESET discovers Kobalos attacking supercomputers

The new threat took its name from Greek mythology, as the Kovaloi were cunning, tiny followers of Dionysus.

ESET researchers have discovered Kobalos, one software that attacks supercomputers – high-performance computing (HPC) clusters. ESET has worked with the CERN Computer Security Group and other organizations involved in tackling attacks on scientific research networks. Among the targets were a major Internet Service Provider (ISP) in Asia, an endpoint security solutions provider in North America, as well as several private servers.

Οι ερευνητές της ESET έχουν επεξεργαστεί μέσω ανάστροφης μηχανικής (reverse engineering ) αυτό το μικρό, αλλά περίπλοκο που είναι φορητό σε πολλά λειτουργικά συστήματα, συμπεριλαμβανομένων των Linux, BSD, Solaris και πιθανώς AIX και Windows.

"We named this malware Kobalos because of the small size of the code and the cunning methods it uses. In Greek mythology, Kovalos is a small, cunning creature ", explains Marc-Etienne Léveillé, who studied Kobalos. "It should be noted that this level of complexity rarely occurs in Linux malware," adds Léveillé.

Kobalos is one containing commands that do not reveal the intent of the attackers. “In short, Kobalos provides remote access to "It allows you to play terminal sessions and allow proxy connections to other servers that are infected with Kobalos," says Léveillé.

Anyone infected by Kobalos can with a single command from the operators turn into a Command & Control (C&C) server. As the IP addresses and ports of the C&C server are built into the executable, operators can then create new instances of Kobalos that use this new C&C server. Additionally, on most systems infected by Kobalos, the SSH client steals credentials.

"The credentials of those who use the SSH client on an infected machine are recorded. "These credentials can then be used by intruders to install Kobalos on the new server," adds Léveillé. Creating two-factor authentication to connect to SSH servers will mitigate the threat, as using stolen credentials seems to be one of the ways in which it can spread to different systems.

More technical details about Kobalos can be found at blogpost “Kobalos - A complex Linux threat to high performance computing infrastructure”At WeLiveSecurity.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).