Individuals across the globe have been reporting a malware known as "perfctl" (also referred to as perfcc) that is wreaking havoc on their Linux servers.
View WhitepaperIndividuals across the globe in the US, Russia, Germany, Indonesia, Korea, China, Spain, and more have been reporting a malware known as "perfctl" (also referred to as perfcc) that is wreaking havoc on their Linux servers. This malware consumes massive amounts of computing power, making systems virtually unusable, and has proven difficult to eliminate.
Perfctl primarily targets Linux servers connected to the internet, exploiting vulnerabilities and misconfigurations to gain initial access. Once inside, it hides itself effectively and continuously siphons computing power for cryptomining or proxyjacking. However, according to Assaf Morag, director of threat intelligence at Aqua Nautilus, its ambitions may extend beyond cryptomining.
Morag has observed perfctl deploying TruffleHog, a legitimate penetration testing tool, to search for hardcoded secrets like credentials or API tokens in source code. He suggests that perfctl operators might also be using these secrets to sell server access to larger organisations in the cyber underground.
The malware’s ability to exploit server misconfigurations is extensive. Researchers identified three web servers tied to the threat actor behind perfctl. Two of these were previously compromised, and one is likely owned by the attacker. The compromised servers revealed significant information, including a list of nearly 20,000 misconfigurations and vulnerabilities that perfctl could exploit.
This list included:
In addition to misconfigurations, perfctl can gain access to servers by exploiting bugs such as CVE-2023-33246, a critical remote command execution (RCE) vulnerability in Apache RocketMQ. This vulnerability scored 9.8 out of 10 on the Common Vulnerability Scoring System (CVSS), highlighting its severity.
Once perfctl gains a foothold, it uses follow-on files containing specific exploits to leverage the misconfigurations it identifies. This ability to continually adapt and evolve makes the malware particularly dangerous.
In order to help defend against perfctl and similar threats, server administrators must take immediate steps to secure their systems. Aqua recommends the following key mitigations:
For those operating Linux servers connected to the internet, it is advised you act now before perfctl finds its way into your network.