The notorious Ebury botnet has plagued approximately 400,000 Linux servers since 2009, targeting vulnerable systems for cryptocurrency theft and other financial gains. ESET researchers have diligently tracked this malware operation for over a decade, witnessing significant updates in its capabilities over the years. Recent findings reveal a disturbing trend of breaching hosting providers and conducting supply chain attacks to exploit clients renting virtual servers.
Ebury’s modus operandi involves a sophisticated blend of credential stuffing attacks, software vulnerabilities exploitation, and interception of SSH traffic to hijack user credentials. Once compromised, servers become conduits for various malicious activities, including cryptocurrency wallet raiding, credit card data theft, spam distribution, and credential sales. The botnet’s resilience is fortified by new obfuscation techniques and a domain generation algorithm (DGA) system, enabling it to evade detection and continue its illicit operations undetected.
Collaborative efforts between ESET and law enforcement agencies, such as the Dutch National High Tech Crime Unit (NHTCU), have led to significant breakthroughs in combating Ebury. A recent seizure of a backup server utilized by the cybercriminals offers hope for disrupting their operations. However, attributing concrete identities to the perpetrators remains challenging, given their adeptness at using fake or stolen identities to evade capture.
The ongoing battle against Ebury underscores the critical importance of proactive cybersecurity measures, including regular software updates, robust access controls, and heightened vigilance against social engineering tactics. As the threat landscape continues to evolve, collaborative efforts between cybersecurity researchers, law enforcement agencies, and affected organizations are paramount to mitigating the risks posed by sophisticated malware operations like Ebury.