CRYSTALRAY hacker expands to 1,500 breached systems using SSH-Snake tool

Share:

A new threat actor known as CRYSTALRAY has significantly broadened its targeting scope with new tactics and exploits, now counting over 1,500 victims whose credentials were stolen and cryptominers deployed.

This is being reported by researchers at Sysdig, who have tracked the threat actor since February, when they first reported their use of the SSH-Snake open-source worm to spread laterally on breached networks.

SSH-snake is an open-source worm that steals SSH private keys on compromised servers and uses them to move laterally to other servers while dropping additional payloads on breached systems.

Previously, Sysdig identified roughly 100 CRYSTALRAY victims impacted by the SSH-Snake attacks and highlighted the network mapping tool’s capabilities to steal private keys and facilitate stealthy lateral network movement.

Biting harder

Sysdig reports that the threat actor behind these attacks, now tracked as CRYSTALRAY, has significantly scaled up their operations, counting 1,500 victims.

“The team’s latest observations show that CRYSTALRAY’s operations have scaled 10x to over 1,500 victims and now include mass scanning, exploiting multiple vulnerabilities, and placing backdoors using multiple OSS security tools,” reads Sysdig’s report.

“CRYSTALRAY’s motivations are to collect and sell credentials, deploy cryptominers, and maintain persistence in victim environments. Some of the OSS tools the threat actor is leveraging include zmap, asn, httpx, nuclei, platypus, and SSH-Snake.”

Sysdig says CRYSTALRAY uses modified proof-of-concept (PoC) exploits delivered to targets using the Sliver post-exploitation toolkit, providing another example of misuse of open-source tooling.

Before launching the exploits, the attackers conduct thorough checks to confirm the flaws discovered through nuclei.

The vulnerabilities CRYSTALRAY targets in its current operations are:

  • CVE-2022-44877: Arbitrary command execution flaw in Control Web Panel (CWP)
  • CVE-2021-3129: Arbitrary code execution bug impacting Ignition (Laravel).
  • CVE-2019-18394: Server-side request forgery (SSRF) vulnerability in Ignite Realtime Openfire

Sysdig says Atlassian Confluence products are likely targeted, too, based on the observed exploitation patterns that emerge from attempts against 1,800 IPs, one-third of which are in the U.S.

CRYSTALRAY uses the Platypus web-based manager to handle multiple reverse shell sessions on the breached systems. At the same time, SSH-Snake continues to be the primary tool by which propagation through compromised networks is achieved.

Once SSH keys are retrieved, the SSH-Snake worm uses them to log into new systems, copy itself, and repeat the process on the new hosts.

SSH-Snake not only spreads the infection but also sends captured keys and bash histories back to CRYSTALRAY’s command and control (C2) server, providing options for greater attack versatility.

Monetizing stolen data

CRYSTALRAY aims to steal credentials stored in configuration files and environment variables using scripts that automate the process.

Threat actors can sell stolen credentials for cloud services, email platforms, or other SaaS tools on the dark web or Telegram for good profit.

Additionally, CRYSTALRAY deploys cryptominers on the breached systems to generate revenue by hijacking the host’s processing power, with a script killing any existing cryptominers to maximize profit.

Sysdig tracked some mining workers to a specific pool and discovered they were making roughly $200/month.

However, starting in April, CRYSTALRAY switched to a new configuration, making it impossible to determine its current revenue.

As the CRYSTALRAY threat grows, the best mitigation strategy is to minimize the attack surface through timely security updates to fix vulnerabilities as they are disclosed.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:46 am, Jan 20, 2025
weather icon 3°C
L: 2° | H: 3°
overcast clouds
Humidity: 87 %
Pressure: 1019 mb
Wind: 3 mph E
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:54 am
Sunset: 4:28 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
2° | 3°°C 0 mm 0% 6 mph 87 % 1019 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
2° | 6°°C 0 mm 0% 3 mph 95 % 1018 mb 0 mm/h
Wed Jan 22 9:00 pm
weather icon
4° | 5°°C 0.5 mm 50% 4 mph 95 % 1009 mb 0 mm/h
Thu Jan 23 9:00 pm
weather icon
2° | 8°°C 1 mm 100% 19 mph 91 % 1009 mb 0 mm/h
Fri Jan 24 9:00 pm
weather icon
4° | 11°°C 1 mm 100% 21 mph 91 % 1010 mb 0 mm/h
Today 3:00 am
weather icon
3° | 3°°C 0 mm 0% 2 mph 87 % 1019 mb 0 mm/h
Today 6:00 am
weather icon
3° | 4°°C 0 mm 0% 2 mph 82 % 1019 mb 0 mm/h
Today 9:00 am
weather icon
4° | 4°°C 0 mm 0% 3 mph 78 % 1019 mb 0 mm/h
Today 12:00 pm
weather icon
6° | 6°°C 0 mm 0% 6 mph 79 % 1019 mb 0 mm/h
Today 3:00 pm
weather icon
7° | 7°°C 0 mm 0% 6 mph 75 % 1018 mb 0 mm/h
Today 6:00 pm
weather icon
5° | 5°°C 0 mm 0% 4 mph 84 % 1018 mb 0 mm/h
Today 9:00 pm
weather icon
4° | 4°°C 0 mm 0% 4 mph 87 % 1018 mb 0 mm/h
Tomorrow 12:00 am
weather icon
3° | 3°°C 0 mm 0% 3 mph 90 % 1018 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€99,249.60
-2.83%
Ethereum(ETH)
€3,182.64
-2.57%
XRP(XRP)
€3.01
-5.16%
Tether(USDT)
€0.97
-0.04%
Solana(SOL)
€236.72
-5.14%
Dogecoin(DOGE)
€0.352917
-10.76%
USDC(USDC)
€0.97
0.00%
Shiba Inu(SHIB)
€0.000020
-11.32%
Pepe(PEPE)
€0.000016
-15.93%
Peanut the Squirrel(PNUT)
€0.382096
-26.55%
Scroll to Top