CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool

A previously observed threat actor using an open-source network mapping tool has significantly expanded their operations, now infecting over 1,500 victims.

Sysdig, which is monitoring this cluster under the name CRYSTALRAY, reported a tenfold increase in activity. The actor is involved in mass scanning, exploiting multiple vulnerabilities, and installing backdoors using various open-source security tools.

The main goals of these attacks are to harvest and sell credentials, deploy cryptocurrency miners, and maintain persistence in victim environments. Most infections are found in the U.S., China, Singapore, Russia, France, Japan, and India.

Among the open-source programs used by the threat actor is SSH-Snake, released in January 2024. This tool enables automatic network traversal using SSH private keys discovered on systems.

Sysdig documented the abuse of SSH-Snake by CRYSTALRAY earlier in February, noting its use for lateral movement after exploiting known security flaws in public-facing Apache ActiveMQ and Atlassian Confluence instances.

Joshua Rogers, the developer behind SSH-Snake, told The Hacker News that the tool automates what would otherwise be manual steps and urged companies to identify and fix existing attack paths.

Other tools employed by the attackers include asn, zmap, httpx, and nuclei to check domain activity and scan for vulnerabilities in services like Apache ActiveMQ, Apache RocketMQ, Atlassian Confluence, Laravel, Metabase, Openfire, Oracle WebLogic Server, and Solr.

CRYSTALRAY also uses its initial access to conduct extensive credential discovery, going beyond server-to-server SSH movements. They maintain persistent access through the legitimate command-and-control (C2) framework Sliver and a reverse shell manager called Platypus.

To monetize infected assets, cryptocurrency miner payloads are deployed, utilizing victim resources for financial gain while eliminating competing miners on the machines.

“CRYSTALRAY can discover and extract credentials from vulnerable systems, selling them on black markets for thousands of dollars,” said Sysdig researcher Miguel Hernández. “The credentials sold cover various services, including Cloud Service Providers and SaaS email providers.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

Sign Up for CXO Digital Pulse Newsletters

Sign Up for CXO Digital Pulse Newsletters to Download the Research Report

Sign Up for CXO Digital Pulse Newsletters to Download the Coffee Table Book

Sign Up for CXO Digital Pulse Newsletters to Download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Share your details to download the report

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report