New Labrat Campaign Unveiled: A Stealthy Threat Targeting Cryptomining and Proxyjacking

Security researchers have recently uncovered a financially motivated cyber threat campaign named Labrat, which cleverly exploits vulnerabilities in order to profit from crypto mining and proxy jacking. These threat actors have gone to great lengths to remain hidden, using various tactics and techniques.

The Labrat Campaign

The Labrat campaign came to light when the team at Sysdig observed the threat actors compromising a targeted container through the use of the legacy GitLab remote code execution vulnerability known as CVE-2021-22205. This flaw allowed them to gain unauthorized access and initiate their malicious activities.

The ultimate objective of the Labrat campaign is to generate revenue by engaging in two primary activities: cryptomining and proxyjacking. Cryptomining involves using the compromised systems’ computational power to mine cryptocurrencies, while proxyjacking allows threat actors to rent out compromised systems used as proxy networks.

Extensive Efforts to Stay Hidden

Unlike many cyber attackers who opt for simple scripts, the Labrat campaign deployed stealthy compiled binaries written in Go and .NET. By doing so, the threat actors enhanced their ability to remain concealed from researchers and network defenders.

In their efforts to obfuscate their command-and-control (C2) network, the attackers exploited a legitimate service called CloudFlare. Leveraging this service allowed them to obscure their malicious activities and increase their chances of avoiding detection.

To maintain their revenue stream and outsmart security defenses, the Labrat attackers continuously update their compiled binaries. This dynamic approach raises the bar for detection, as traditional signature-based defenses struggle to keep up with the rapidly evolving threat.

To ensure persistence, the Labrat attackers utilize a legitimate open-source tool known as Global Socket (GSocket). By leveraging this tool, the attackers can maintain their foothold on compromised systems, making it challenging for organizations to entirely remove their presence.

Potential Expansion of the Campaign

Beyond engaging in cryptomining and proxyjacking, the Labrat campaign offers potential for broader implications. The backdoor deployed by the attackers provides them with access to compromised systems, enabling them to potentially exploit these footholds for other malicious purposes.

Recommendations for Impacted Users

Users impacted by the CVE-2021-22205 vulnerability should promptly adhere to their organization’s security incident and disaster recovery protocols. This includes reporting the incident, deprovisioning the compromised instance, and initiating recovery procedures.

To mitigate the risk posed by the Labrat campaign, it is crucial to deprovision the compromised GitLab instance promptly. Following this, organizations should restore their systems using the latest good working backup to a new GitLab instance, ensuring a clean and secure environment for operations.

The Labrat campaign represents a significant threat in the realm of cybercrime, targeting financial gain through cryptomining and proxyjacking. By utilizing undetected binaries, abusing legitimate services, and constantly updating their techniques, the threat actors behind Labrat have demonstrated their commitment to remaining hidden and profitable. As this campaign evolves, it is imperative for organizations to be vigilant, follow security best practices, and leverage robust detection and prevention measures to safeguard their systems and data.

Explore more

Explainable AI Turns CRM Data Into Proactive Insights

The modern enterprise is drowning in a sea of customer data, yet its most strategic decisions are often made while looking through a fog of uncertainty and guesswork. For years, Customer Relationship Management (CRM) systems have served as the definitive record of customer interactions, transactions, and histories. These platforms hold immense potential value, but their primary function has remained stubbornly

Agent-Based AI CRM – Review

The long-heralded transformation of Customer Relationship Management through artificial intelligence is finally materializing, not as a complex framework for enterprise giants but as a practical, agent-based model designed to empower the underserved mid-market. Agent-Based AI represents a significant advancement in the Customer Relationship Management sector. This review will explore the evolution of the technology, its key features, performance metrics, and

Fewer, Smarter Emails Win More Direct Bookings

The relentless barrage of promotional emails, targeted ads, and text message alerts has fundamentally reshaped consumer behavior, creating a digital environment where the default response is to ignore, delete, or disengage. This state of “inbox surrender” presents a formidable challenge for hotel marketers, as potential guests, overwhelmed by the sheer volume of commercial messaging, have become conditioned to tune out

Is the UK Financial System Ready for an AI Crisis?

A new report from the United Kingdom’s Treasury Select Committee has sounded a stark alarm, concluding that the country’s top financial regulators are adopting a dangerously passive “wait-and-see” approach to artificial intelligence that exposes consumers and the entire financial system to the risk of “serious harm.” The Parliamentary Committee, which is appointed by the House of Commons to oversee critical

LLM Data Science Copilots – Review

The challenge of extracting meaningful insights from the ever-expanding ocean of biomedical data has pushed the boundaries of traditional research, creating a critical need for tools that can bridge the gap between complex datasets and scientific discovery. Large language model (LLM) powered copilots represent a significant advancement in data science and biomedical research, moving beyond simple code completion to become