This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

CRYSTALRAY Hacker Expands to 1,500 Breached Systems with SSH-Snake Tool

Updated on July 12, 2024

2 Min Read
CRYSTALRAY Hacker Expands to 1,500 Breached Systems with SSH-Snake Tool


A new threat actor known as CRYSTALRAY has significantly expanded its targeting scope with new tactics and exploits, now affecting over 1,500 victims whose credentials were stolen and cryptominers deployed. Researchers at Sysdig have tracked this threat actor since February when they first reported the use of the SSH-Snake open-source worm to spread laterally on breached networks.

SSH-Snake is an open-source worm that steals SSH private keys on compromised servers and uses them to move laterally to other servers while dropping additional payloads on breached systems. Initially, Sysdig identified roughly 100 CRYSTALRAY victims impacted by SSH-Snake attacks, highlighting the worm’s capability to steal private keys and facilitate stealthy lateral network movement.

via GIPHY

Sysdig reports that CRYSTALRAY’s operations have now scaled up to 1,500 victims, involving mass scanning, exploiting multiple vulnerabilities, and placing backdoors using various open-source security tools. The threat actor’s motivations include collecting and selling credentials, deploying cryptominers, and maintaining persistence in victim environments. Some of the open-source tools leveraged by CRYSTALRAY include zmap, asn, httpx, nuclei, platypus, and SSH-Snake.

CRYSTALRAY targets several vulnerabilities in its current operations, including:

  • CVE-2022-44877: Arbitrary command execution flaw in Control Web Panel (CWP)
  • CVE-2021-3129: Arbitrary code execution bug impacting Ignition (Laravel)
  • CVE-2019-18394: Server-side request forgery (SSRF) vulnerability in Ignite Realtime Openfire

The attackers use the Platypus web-based manager to handle multiple reverse shell sessions on breached systems, while SSH-Snake continues to be the primary tool for propagation through compromised networks. Once SSH keys are retrieved, SSH-Snake uses them to log into new systems, copy itself, and repeat the process on new hosts. This tool not only spreads the infection but also sends captured keys and bash histories back to CRYSTALRAY’s command and control (C2) server.

CRYSTALRAY aims to steal credentials stored in configuration files and environment variables, automating the process with scripts. These stolen credentials can be sold on the dark web or Telegram for profit. Additionally, CRYSTALRAY deploys cryptominers on breached systems to generate revenue by hijacking the host’s processing power, with a script that kills any existing cryptominers to maximize profit.

As CRYSTALRAY’s threat grows, the best mitigation strategy is to minimize the attack surface through timely security updates to fix vulnerabilities as they are disclosed.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour