S0377 Ebury
Ebury is an SSH backdoor targeting Linux operating systems. Attackers require root-level access, which allows them to replace SSH binaries (ssh, sshd, ssh-add, etc) or modify a shared library used by OpenSSH (libkeyutils).123
| Item | Value | 
|---|---|
| ID | S0377 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.3 | 
| Created | 19 April 2019 | 
| Last Modified | 23 April 2021 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - | 
| enterprise | T1071.004 | DNS | Ebury has used DNS requests over UDP port 53 for C2.1 | 
| enterprise | T1020 | Automated Exfiltration | Ebury can automatically exfiltrate gathered SSH credentials.4 | 
| enterprise | T1059 | Command and Scripting Interpreter | - | 
| enterprise | T1059.006 | Python | Ebury has used Python to implement its DGA.3 | 
| enterprise | T1554 | Compromise Client Software Binary | Ebury has been embedded into modified OpenSSH binaries to gain persistent access to SSH credential information.1 | 
| enterprise | T1132 | Data Encoding | - | 
| enterprise | T1132.001 | Standard Encoding | Ebury has encoded C2 traffic in hexadecimal format.1 | 
| enterprise | T1140 | Deobfuscate/Decode Files or Information | Ebury has verified C2 domain ownership by decrypting the TXT record using an embedded RSA public key.3 | 
| enterprise | T1568 | Dynamic Resolution | - | 
| enterprise | T1568.002 | Domain Generation Algorithms | Ebury has used a DGA to generate a domain name for C2.13 | 
| enterprise | T1573 | Encrypted Channel | - | 
| enterprise | T1573.001 | Symmetric Cryptography | Ebury has encrypted C2 traffic using the client IP address, then encoded it as a hexadecimal string.1 | 
| enterprise | T1041 | Exfiltration Over C2 Channel | Ebury can exfiltrate SSH credentials through custom DNS queries.4 | 
| enterprise | T1008 | Fallback Channels | Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn’t connected to the infected system for three days.3 | 
| enterprise | T1083 | File and Directory Discovery | Ebury can list directory entries.3 | 
| enterprise | T1574 | Hijack Execution Flow | - | 
| enterprise | T1574.006 | Dynamic Linker Hijacking | Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD.3 | 
| enterprise | T1562 | Impair Defenses | - | 
| enterprise | T1562.001 | Disable or Modify Tools | Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules.3 | 
| enterprise | T1562.006 | Indicator Blocking | Ebury can hook logging functions so that nothing from the backdoor gets sent to the logging facility.1 | 
| enterprise | T1556 | Modify Authentication Process | Ebury can intercept private keys using a trojanized ssh-addfunction.1 | 
| enterprise | T1556.003 | Pluggable Authentication Modules | Ebury can deactivate PAM modules to tamper with the sshd configuration.3 | 
| enterprise | T1027 | Obfuscated Files or Information | Ebury has obfuscated its strings with a simple XOR encryption with a static key.1 | 
| enterprise | T1014 | Rootkit | Ebury has used user mode rootkit techniques to remain hidden on the system.3 | 
| enterprise | T1553 | Subvert Trust Controls | - | 
| enterprise | T1553.002 | Code Signing | Ebury has installed a self-signed RPM package mimicking the original system package on RPM based systems.1 | 
| enterprise | T1552 | Unsecured Credentials | - | 
| enterprise | T1552.004 | Private Keys | Ebury has intercepted unencrypted private keys as well as private key pass-phrases.1 | 
Groups That Use This Software
| ID | Name | References | 
|---|---|---|
| G0124 | Windigo | 3 | 
References
- 
M.Léveillé, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019. ↩↩↩↩↩↩↩↩↩↩↩ 
- 
Cimpanu, C.. (2017, March 29). Russian Hacker Pleads Guilty for Role in Infamous Linux Ebury Malware. Retrieved April 23, 2019. ↩ 
- 
Vachon, F. (2017, October 30). Windigo Still not Windigone: An Ebury Update . Retrieved February 10, 2021. ↩↩↩↩↩↩↩↩↩↩↩ 
- 
Bilodeau, O., Bureau, M., Calvet, J., Dorais-Joncas, A., Léveillé, M., Vanheuverzwijn, B. (2014, March 18). Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign. Retrieved February 10, 2021. ↩↩