New Labrat Campaign Unveiled: A Stealthy Threat Targeting Cryptomining and Proxyjacking

Security researchers have recently uncovered a financially motivated cyber threat campaign named Labrat, which cleverly exploits vulnerabilities in order to profit from crypto mining and proxy jacking. These threat actors have gone to great lengths to remain hidden, using various tactics and techniques.

The Labrat Campaign

The Labrat campaign came to light when the team at Sysdig observed the threat actors compromising a targeted container through the use of the legacy GitLab remote code execution vulnerability known as CVE-2021-22205. This flaw allowed them to gain unauthorized access and initiate their malicious activities.

The ultimate objective of the Labrat campaign is to generate revenue by engaging in two primary activities: cryptomining and proxyjacking. Cryptomining involves using the compromised systems’ computational power to mine cryptocurrencies, while proxyjacking allows threat actors to rent out compromised systems used as proxy networks.

Extensive Efforts to Stay Hidden

Unlike many cyber attackers who opt for simple scripts, the Labrat campaign deployed stealthy compiled binaries written in Go and .NET. By doing so, the threat actors enhanced their ability to remain concealed from researchers and network defenders.

In their efforts to obfuscate their command-and-control (C2) network, the attackers exploited a legitimate service called CloudFlare. Leveraging this service allowed them to obscure their malicious activities and increase their chances of avoiding detection.

To maintain their revenue stream and outsmart security defenses, the Labrat attackers continuously update their compiled binaries. This dynamic approach raises the bar for detection, as traditional signature-based defenses struggle to keep up with the rapidly evolving threat.

To ensure persistence, the Labrat attackers utilize a legitimate open-source tool known as Global Socket (GSocket). By leveraging this tool, the attackers can maintain their foothold on compromised systems, making it challenging for organizations to entirely remove their presence.

Potential Expansion of the Campaign

Beyond engaging in cryptomining and proxyjacking, the Labrat campaign offers potential for broader implications. The backdoor deployed by the attackers provides them with access to compromised systems, enabling them to potentially exploit these footholds for other malicious purposes.

Recommendations for Impacted Users

Users impacted by the CVE-2021-22205 vulnerability should promptly adhere to their organization’s security incident and disaster recovery protocols. This includes reporting the incident, deprovisioning the compromised instance, and initiating recovery procedures.

To mitigate the risk posed by the Labrat campaign, it is crucial to deprovision the compromised GitLab instance promptly. Following this, organizations should restore their systems using the latest good working backup to a new GitLab instance, ensuring a clean and secure environment for operations.

The Labrat campaign represents a significant threat in the realm of cybercrime, targeting financial gain through cryptomining and proxyjacking. By utilizing undetected binaries, abusing legitimate services, and constantly updating their techniques, the threat actors behind Labrat have demonstrated their commitment to remaining hidden and profitable. As this campaign evolves, it is imperative for organizations to be vigilant, follow security best practices, and leverage robust detection and prevention measures to safeguard their systems and data.

Explore more

Business Central Mobile Apps Transform Operations On-the-Go

In an era where business agility defines success, the ability to manage operations from any location has become a critical advantage for companies striving to stay ahead of the curve, and Microsoft Dynamics 365 Business Central mobile apps are at the forefront of this shift. These apps redefine how organizations handle essential tasks like finance, sales, and inventory management by

Transparency Key to Solving D365 Pricing Challenges

Understanding the Dynamics 365 Landscape Imagine a business world where operational efficiency hinges on a single, powerful tool, yet many enterprises struggle to harness its full potential due to unforeseen hurdles. Microsoft Dynamics 365 (D365), a leading enterprise resource planning (ERP) and customer relationship management (CRM) solution, stands as a cornerstone for medium to large organizations aiming to integrate and

Generative AI Transforms Finance with Automation and Strategy

This how-to guide aims to equip finance professionals, particularly chief financial officers (CFOs) and their teams, with actionable insights on leveraging generative AI to revolutionize their operations. By following the steps outlined, readers will learn how to automate routine tasks, enhance strategic decision-making, and position their organizations for competitive advantage in a rapidly evolving industry. The purpose of this guide

How Is Tech Revolutionizing Traditional Payroll Systems?

In an era where adaptability defines business success, the payroll landscape is experiencing a profound transformation driven by technological innovation, reshaping how companies manage compensation. For decades, businesses relied on rigid monthly or weekly pay cycles that often failed to align with the diverse needs of employees or the dynamic nature of modern enterprises. Today, however, a wave of cutting-edge

Why Is Employee Career Development a Business Imperative?

Setting the Stage for a Critical Business Priority Imagine a workplace where top talent consistently leaves for better opportunities, costing millions in turnover while productivity stagnates due to outdated skills. This scenario is not a distant possibility but a reality for many organizations that overlook employee career development. In an era of rapid technological change and fierce competition for skilled