Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Ebury’s Linux Server Onslaught

May 15, 2024
Reading Time: 3 mins read
in Alerts
Ebury’s Linux Server Onslaught

The notorious Ebury botnet has plagued approximately 400,000 Linux servers since 2009, targeting vulnerable systems for cryptocurrency theft and other financial gains. ESET researchers have diligently tracked this malware operation for over a decade, witnessing significant updates in its capabilities over the years. Recent findings reveal a disturbing trend of breaching hosting providers and conducting supply chain attacks to exploit clients renting virtual servers.

Ebury’s modus operandi involves a sophisticated blend of credential stuffing attacks, software vulnerabilities exploitation, and interception of SSH traffic to hijack user credentials. Once compromised, servers become conduits for various malicious activities, including cryptocurrency wallet raiding, credit card data theft, spam distribution, and credential sales. The botnet’s resilience is fortified by new obfuscation techniques and a domain generation algorithm (DGA) system, enabling it to evade detection and continue its illicit operations undetected.

Collaborative efforts between ESET and law enforcement agencies, such as the Dutch National High Tech Crime Unit (NHTCU), have led to significant breakthroughs in combating Ebury. A recent seizure of a backup server utilized by the cybercriminals offers hope for disrupting their operations. However, attributing concrete identities to the perpetrators remains challenging, given their adeptness at using fake or stolen identities to evade capture.

The ongoing battle against Ebury underscores the critical importance of proactive cybersecurity measures, including regular software updates, robust access controls, and heightened vigilance against social engineering tactics. As the threat landscape continues to evolve, collaborative efforts between cybersecurity researchers, law enforcement agencies, and affected organizations are paramount to mitigating the risks posed by sophisticated malware operations like Ebury.

Reference:
  • Ebury Botnet Infects 400,000 Linux Servers for Cryptocurrency Theft and Profit

Tags: BotnetCryptocurrenciesCyber AlertCyber Alerts 2024Cyber RiskCyber threatEburyLinuxMalwareMay 2024Servers
ADVERTISEMENT

Related Posts

BEARDSHELL and COVENANT Malware Uncovered

BEARDSHELL and COVENANT Malware Uncovered

June 24, 2025
New Malware Skims WordPress E-commerce Sites

New Malware Skims WordPress E-commerce Sites

June 24, 2025
Chinese Hackers Build Router Spy Network

Chinese Hackers Build Router Spy Network

June 24, 2025
Stealth Malware Targets Fortinet Firewalls

Spyware in App Stores Steals Your Photos

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Stealth Malware Targets Fortinet Firewalls

June 23, 2025

Latest Alerts

Chinese Hackers Build Router Spy Network

New Malware Skims WordPress E-commerce Sites

BEARDSHELL and COVENANT Malware Uncovered

Prometei Botnet Attacks Servers for Crypto

Spyware in App Stores Steals Your Photos

Stealth Malware Targets Fortinet Firewalls

Subscribe to our newsletter

    Latest Incidents

    Hacken Token Crashes 99 Percent After Hack

    Paraguayan Government Hit By Cyberattack

    Hackers Leak Saudi Games Athlete Data

    Aflac Hacked in Spree on Insurance Firms

    CoinMarketCap Doodle Hack Steals Crypto

    UK’s Oxford Council Legacy Systems Breached

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial