Heimdal
article featured image

Contents:

Researchers warn that the Linux PRoot utility is now frequently used by threat actors in BYOF (Bring Your Own Filesystem) attacks. Unfortunately, the technique can be successfully used on various Linux distributions, like Ubuntu, Fedora, or Alpine.

What`s a BYOF Attack?

When threat actors create a malicious filesystem that holds a typical set of hijacking tools, and they do this on their own device, we call it a Bring Your Own Filesystem (BYOF) attack.

After being downloaded and launched on compromised machines, the malicious filesystem offers cybercriminals a prefigured toolkit they will use in order to keep compromising the Linux system.

How Do Cybercriminals Use PRoot

The PRoot open-source utility was not meant to be a malicious item, but to improve compatibility and help system administrators do their job easier.

Without any privileges or setup, it allows users to employ an arbitrary directory as the new root filesystem and make files accessible somewhere else in the filesystem hierarchy.

It combines commands like chmod, mount, and binfmt_misc in order to isolate completely from the host the new filesystem. In this new guest filesystem, one can execute custom jobs and use the host resources, for example. Although the PRoot processes are limited to the guest filesystem, one can use QEMU emulation for mixing programs execution of host and guest.

According to cyber researchers

First, threat actors build a malicious filesystem which will be deployed. Any dependencies or configurations are also included in the filesystem, so the attacker does not need to run any additional setup commands.

The attacker launches PRoot, points it at the unpacked malicious filesystem, and specifies the XMRig binary to execute.

Source

What`s the Gain for Hijackers

Researchers warn that the technique can be used for many harmful scenarios, the attacks rather target cryptocurrency mining.

Exploiting PRoot can also easily increase the number of malicious operations against Linux endpoints, according to researchers.

Pre-built PRoot filesystems allow threat actors to use their toolkit across various OS configurations while they don`t even have to port their malware to the target or include build tools.

Using PRoot, there is little regard or concern for the target’s architecture or distribution since the tool smoothes out the attack struggles often associated with executable compatibility, environment setup, and malware and/or miner execution

Source

The universal wish of hackers “write once, run everywhere” is now a dream come true.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, Youtube, and Instagram for more cybersecurity news and topics.

Author Profile

Livia Gyongyoși

Communications and PR Officer

Livia Gyongyoși is a Communications and PR Officer within Heimdal®, passionate about cybersecurity. Always interested in being up to date with the latest news regarding this domain, Livia's goal is to keep others informed about best practices and solutions that help avoid cyberattacks.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE