Rocke, the New Monero Cryptojacking Malware on the Block
Cryptocurrency mining malware, also known as Cryptojacking has steadily stolen the spotlight from ransomware from last year. It is a form of malware with the goal of mining cryptocurrency for its author using the CPU and GPU cycles of the victim computer. The loudness of a ransomware infection (when the malware needs to announce its existence to the user to solicit a ransom payment) is far from the silence of a crytojacking infection. Cryptojacking needs time and stolen processing cycles to effectively mine crypto-coins for its authors.
As reported by Cisco in their official blog, Git repositories are being targeted by a Monero cryptojacking malware known as ‘Rocke’ since April this year. Rocke is developed with vulnerable Http File servers and Git repositories in-mind, in its quest to mine Monero coins.
The Rocke cryptojacking malware is considered by Cisco to be a work in progress, as more and more features are added in every new variant. “We will examine several of Rocke’s campaigns, malware, and infrastructure while uncovering more information about the actor. After months of research, we believe that Rocke is an actor that must be followed, as they continue to add new features to their malware and are actively exploring new attack vectors,” added Liebensberg.
From Cisco’s further analysis, they have found-out that two particular known vulnerabilities are currently being exploited by the Rocke’s payload: CVE-2017-10271 and CVE-2017-3066. The former is all about an Oracle WebLogic server vulnerability, while the latter pertains to an Adobe Coldfusion Java deserialization flaw. Embedded in the Rocke’s code is a copy of TermsHost.exe, a well-known Monero coin mining module, which anyone can buy for $14. The monero coin mining module is tweaked by the virus authors in order to perform hashes during the machine’s idle periods. This lessens the chances of users recognizing that there is a problem with the machine during its busy periods. Rocke also hijacks the registry startup entry in order to launch itself on the background automatically after a reboot, and create a loophole in the Windows firewall to allow incoming and outgoing traffic from Rocke to its Command and Control Servers.
“Cisco Talos assesses with high confidence that Rocke will continue to leverage Git repositories to download and execute illicit mining onto victim machines. It is interesting to note that they are expanding their toolset to include browser-based miners, difficult-to-detect trojans, and the Cobalt Strike malware. Besides noisy scan-and-exploit activity, it appears that Rocke is likely also pursuing social engineering as a new infection vector, as demonstrated by the repositories involving fake Adobe Flash and Google Chrome updates,” concluded Liebensberg.
Julia Sowells410 Posts
Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.