Pervasive ‘perfctl’ Fileless Malware Threatens Millions of Linux Servers Globally

October 3, 2024

The 'perfctl' malware, also known as perfcc, has been plaguing Linux servers across the globe for years, implementing cryptomining and proxyjacking malware. This persistent threat has been reported in countries ranging from the US and Russia to Germany, Indonesia, Korea, China, and Spain. Assaf Morag, chief researcher at Aqua Nautilus, recalls numerous instances of individuals struggling to eliminate the malware due to its persistent and elusive nature.

The malware exploits vulnerabilities and misconfigurations to gain initial access to servers. According to Aqua Nautilus, 'perfctl' has likely targeted millions of Linux servers and compromised thousands. Any Linux server connected to the internet is a potential target.

In addition to its cryptomining and proxyjacking activities, 'perfctl' has been observed dropping TruffleHog, a legitimate penetration testing tool used to discover hardcoded secrets in source code. Morag speculates that the malware could potentially be stealing and selling secrets on the cyber underground, in addition to its other activities.

The malware has an extensive repertoire of server misconfigurations and vulnerabilities that it can exploit. Researchers tracking its activities identified three web servers associated with the threat actor: two previously compromised, and one likely owned by the threat actor. The primary malware deployment base was one of the compromised servers.

The other compromised server contained a list of nearly 20,000 potential paths for directory traversal, including over 12,000 known server misconfigurations, nearly 2,000 paths to unauthorized credentials, tokens, and keys, over 1,000 techniques for unauthorized login, and dozens of possible application misconfigurations.

'perfctl' can also gain initial access to a server through various bugs, including CVE-2023-33246, a critical remote command execution vulnerability in Apache RocketMQ. Despite the loud nature of cryptomining and proxyjacking, 'perfctl' employs sophisticated stealth and persistence mechanisms, making it hard to detect or remove.

The malware uses process masquerading and a legitimate-sounding name to avoid detection. After execution, it continues to run as a service in the background, even after deleting its binary. To further obscure its activities, it deploys user-level and kernel-level rootkits.

When a user logs into a compromised server, 'perfctl' halts its most noticeable behaviors, resuming once the user logs off. In summary, 'perfctl' is a powerful tool, capable of data theft, cryptocurrency mining, and proxyjacking.

Linux server operators are advised to take immediate protective measures. Recommended mitigations include patching vulnerabilities, particularly CVE-2021-4043 and those in RocketMQ servers, restricting file execution, disabling unused services, implementing strict privilege management, network segmentation, and deploying runtime protection.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.