Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks 

Glibc vulnerability affecting major Linux distributions and tracked as Looney Tunables exploited in cloud attacks by Kinsing group. 

Looney Tunables vulnerability exploited

A serious privilege escalation vulnerability patched recently in the GNU C Library (glibc) has been exploited in cloud attacks by a threat group known for the use of the Kinsing malware and for its cryptojacking operations.  

The security hole, tracked as CVE-2023-4911 and named Looney Tunables, has been found to impact major Linux distributions, including Debian, Gentoo, Red Hat, and Ubuntu. It allows a local attacker to execute arbitrary code with elevated privileges.

According to cloud security firm Aqua Security, the group behind Kinsing, which is tracked by Palo Alto Networks as Money Libra, has exploited the Looney Tunables vulnerability in recent attacks.

The Kinsing group has been known for deploying its Linux malware in container environments, its ultimate goal being the delivery of cryptocurrency miners. The threat actor poses a significant threat to Kubernetes, Docker, Jenkins and Redis servers, and it was recently observed targeting Openfire servers via a vulnerability tracked as CVE-2023-32315.

In the recent attacks seen by Aqua Security, the Kinsing hackers exploited a PHPUnit vulnerability tracked as CVE-2017-9841 for initial access.

The attackers then conducted manual tests — this represents a deviation from their typical modus operandi — and this included attempts to exploit the Looney Tunables vulnerability, which can be leveraged to gain root access to the system. They targeted the flaw using a publicly available PoC exploit.

Advertisement. Scroll to continue reading.

The hackers then downloaded additional scripts providing backdoor access to the server and enabling them to obtain information, particularly credentials associated with the Cloud Service Provider (CSP).

“From what we know, this is the first time Kinsing has tried to collect this kind of information,” Aqua Security noted. “Before, they mostly focused on spreading their malware and running a cryptominer, often trying to increase their chances to succeed by eliminating competition or evading detection. This, however, new move shows that Kinsing might be planning to do more varied and intense activities soon, which could mean a bigger risk for systems and services that run on the cloud.”

The security firm has shared indicators of compromise (IoCs), MITRE ATT&CK mapping, and recommendations for preventing and detecting these types of attacks.

Related: Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution

Related: Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data

Related: StackRot Linux Kernel Vulnerability Shows Exploitability of UAFBR Bugs

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.