{"id":130622,"date":"2023-06-22T09:00:00","date_gmt":"2023-06-22T16:00:00","guid":{"rendered":""},"modified":"2025-06-18T01:57:20","modified_gmt":"2025-06-18T08:57:20","slug":"iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/","title":{"rendered":"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Cryptojacking, the illicit use of computing resources to mine cryptocurrency, has become increasingly prevalent in recent years, with attackers building a cybercriminal economy around attack tools, infrastructure, and services to generate revenue from targeting a wide range of vulnerable systems, including Internet of Things (IoT) devices. Microsoft researchers have recently discovered an attack leveraging custom and open-source tools to target internet-facing Linux-based systems and IoT devices. The attack uses a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Utilizing an established criminal infrastructure that has incorporated the use of a Southeast Asian financial institution\u2019s subdomain as a command and control (C2) server, the threat actors behind the attack use a backdoor that deploys a wide array of tools and components such as rootkits and an IRC bot to steal device resources for mining operations. The backdoor also installs a patched version of OpenSSH on affected devices, allowing threat actors to hijack SSH credentials, move laterally within the network, and conceal malicious SSH connections. The complexity and scope of this attack are indicative of the efforts attackers make to evade detection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this blog post, we present our analysis of the tools and techniques used in this attack and the efforts made by the threat actor to evade detection on affected devices. We also provide indicators of compromise and relevant Microsoft Defender for IoT and Microsoft Defender for Endpoint detections, as well as recommendations for defenders to protect devices and networks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"attack-chain\">Attack chain<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The threat actors initiate the attack by attempting to brute force various credentials on misconfigured internet-facing Linux devices. Upon compromising a target device, they disable shell history and retrieve a compromised OpenSSH archive named <em>openssh-8.0p1.tgz<\/em> from a remote server. The archive contains benign OpenSSH source code alongside several malicious files: the shell script <em>inst.sh<\/em>, backdoor binaries for multiple architectures (x86-64, arm4l, arm5l, i568, and i686), and an archive containing the shell script <em>vars.sh<\/em>, which holds embedded files for the backdoor\u2019s operation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">After installing the payload, the shell script <em>inst.sh<\/em> runs a backdoor binary that matches the target device\u2019s architecture. The backdoor is a shell script compiled using an open-source project called Shell Script Compiler (shc), and enables the threat actors to perform subsequent malicious activities and deploy additional tools on affected systems.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-1-openssh-trojan-attack-chain.webp\" alt=\"OpenSSH trojan attack chain starting from the threat actor gaining access to routers through brute force attack, leading to the download of multiple malicious files that enable the actor steal SSH credentials and launch commands through IRC.\" class=\"wp-image-130625 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-1-openssh-trojan-attack-chain.webp\"><figcaption class=\"wp-element-caption\">Figure 1. OpenSSH trojan attack chain.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"custom-backdoor-deploys-open-source-rootkits\">Custom backdoor deploys open-source rootkits<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Once running on a device, the shell script backdoor tests access to <em>\/proc<\/em> to determine whether the device is a honeypot. If it can\u2019t access <em>\/proc<\/em>, it determines the device is a honeypot and exits. Otherwise, it exfiltrates information about the device, including its operating system version, network configuration, and the contents of <em>\/etc\/passwd<\/em> and <em>\/etc\/shadow<\/em> over email to the hardcoded address <em>dotsysadmin[@]protonmail[.]com<\/em>, and to any email address provided by the threat actor as an argument to the script.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On supported systems, the backdoor downloads, compiles, and installs two open-source rootkits available on GitHub, Diamorphine and Reptile. The backdoor configures Reptile to connect to the C2 domain <em>rsh.sys-stat[.]download<\/em> on port 4444 and to hide its child processes, files, or their content. Microsoft researchers assess that the Diamorphine rootkit is used to hide processes as well.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-2-any-content-in-a-file-that-appears-between-r-tag-which-is-defined-as-ubiqsys-will-be-hidden.webp\" alt=\"Screenshot of code from malware used by the threat actor to hides files.\" class=\"wp-image-130626 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-2-any-content-in-a-file-that-appears-between-r-tag-which-is-defined-as-ubiqsys-will-be-hidden.webp\"><figcaption class=\"wp-element-caption\">Figure 2. Any content in a file that appears between __R_TAG, which is defined as &#8220;ubiqsys&#8221;, will be hidden.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">To ensure persistent SSH access to the device, the backdoor appends two public keys to the <em>authorized_keys<\/em> configuration files of all users on the system.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-3-adding-ssh-keys-to-all-users-to-preserve-ssh-access.webp\" alt=\"Screenshot of malware code adding SSH keys to all users for the threat actor to preserve acccess to the SSH server\" class=\"wp-image-130627 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-3-adding-ssh-keys-to-all-users-to-preserve-ssh-access.webp\"><figcaption class=\"wp-element-caption\">Figure 3. Adding SSH keys to all users to preserve SSH access.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The backdoor obscures its activity by removing records from Apache, nginx, httpd, and system logs that contain the IP and username specified as arguments to the script. Additionally, it has the capability to install an open-source utility called <em>logtamper<\/em> to clear the <em>utmp <\/em>and <em>wtmp<\/em> logs, which record information about user sign-in sessions and system events.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The backdoor eliminates cryptomining competition from other miners that may exist on the device by monopolizing device resources and preventing communication with a hardcoded list of hosts and IPs related to these activities. It accomplishes this by adding iptables rules to drop communication with the hosts and IPs and configuring <em>\/etc\/hosts<\/em> to make the hosts resolve to the localhost address. It also identifies miner processes and files by their names and either terminates them or blocks access to them, and removes SSH access configured in <em>authorized_keys<\/em> by other adversaries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"patching-openssh-source-code\">Patching OpenSSH source code<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The backdoor uses the Linux <em>patch<\/em> utility to apply the patch file <em>ss.patch<\/em>, which is embedded in <em>vars.sh<\/em>, to the OpenSSH source code files included in its package. Once the patches are applied, the backdoor compiles and installs the modified OpenSSH on the device.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The compromised OpenSSH grants the attackers persistent access to the device and to the SSH credentials the device handles. The patches install hooks that intercept the passwords and keys of the device\u2019s SSH connections, whether as a client or a server. The passwords and keys are then stored encrypted in a file on the disk. Moreover, the patches enable root login over SSH and conceal the intruder\u2019s presence by suppressing the logging of the threat actors\u2019 SSH sessions, which are distinguished by a special password.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The modified version of OpenSSH mimics the appearance and behavior of a legitimate OpenSSH server and may thus pose a greater challenge for detection than other malicious files. The patched OpenSSH could also enable the threat actors to access and compromise additional devices. This type of attack demonstrates the techniques and persistence of adversaries who seek to infiltrate and control exposed devices.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-4-openssh-patch-to-save-incoming-ssh-passwords-sspatch.webp\" alt=\"Screenshot of code from the modified version of OpenSSH installed by the threat actor. The code saves incoming SSH passwords.\" class=\"wp-image-130628 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-4-openssh-patch-to-save-incoming-ssh-passwords-sspatch.webp\"><figcaption class=\"wp-element-caption\">Figure 4. OpenSSH patch to save incoming SSH passwords (ss.patch)<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"botnet-operation\">Botnet operation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The backdoor runs a secondary payload embedded in the shell script <em>vars.sh<\/em>, which is a slightly modified version of <a href=\"https:\/\/github.com\/isdrupter\/ziggystartux\">ZiggyStarTux<\/a>, an open-source IRC bot based on the Kaiten malware. Among its features is executing bash commands issued from the C2 and possessing distributed denial of service (DDoS) capabilities.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The backdoor employs various mechanisms to set up ZiggyStarTux\u2019s persistence on compromised systems. It copies the ZiggyStarTux binary to several locations on the disk and establishes <em>cron<\/em> jobs to invoke it at regular intervals. Moreover, it runs a bash script that registers ZiggyStarTux as a <em>systemd <\/em>service by creating and configuring the service file <em>\/etc\/systemd\/system\/network-check.service<\/em>.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-5-registration-of-ziggystartux-as-systemd-service.webp\" alt=\"Screenshot of malware code where ZiggyStarTux is registered as a systemd service\" class=\"wp-image-130629 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-5-registration-of-ziggystartux-as-systemd-service.webp\"><figcaption class=\"wp-element-caption\">Figure 5. Registration of ZiggyStarTux as a systemd service<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Analysis of ZiggyStarTux revealed that the threat actors stripped the binary of logging-related strings and incorporated a function that writes the bot\u2019s process ID to <em>\/var\/run\/sys_checker.pid<\/em>, allowing the backdoor to read that file and conceal that process ID using the installed rootkits.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The ZiggyStarTux bots communicate with the C2 via an IRC server hosted on various domains and IPs located in different geographical regions. Evidence indicates that the threat actors disguise their traffic by utilizing the subdomain of a Southeast Asian financial institution that is hosted on one of their own servers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To receive commands, the ZiggyStarTux bots connect to the IRC server and join a hidden password-protected channel named <em>##..##<\/em>. The server was observed issuing bash commands that instruct bots to download and launch two shell scripts from a remote server. The first script, <em>lscan<\/em>, retrieves <em>lssh.tgz<\/em> from the server, an archive of scripts that scan each IP in the subnet for SSH access using a password list. The scripts record the results of each connection attempt in a log file.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The second script, <em>zaz<\/em>, fetches the compromised OpenSSH package with the embedded backdoor from the remote server. The installation is carried out using the email address <em>ancientgh0st@yahoo[.]com<\/em> as an argument to serve as an additional exfiltration point for device information. Additionally, <em>zaz<\/em> retrieves an archive called <em>hive-start.tgz<\/em> which contains mining malware crafted for Hiveon OS systems, a Linux-based open-source operating system designed for cryptomining.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indications-of-criminal-cooperation\">Indications of criminal cooperation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft researchers have traced the campaign to a user named <em>asterzeu<\/em> on the hacking forum <em>cardingforum[.]cx<\/em>, who offered multiple tools for sale on the platform, including an SSH backdoor. The domain <em>madagent[.]tm<\/em> was registered in 2015 with an email address matching the username and shared numerous servers over a four-year period with <em>madagent[.]cc<\/em>, one of the C2 domains of ZiggyStarTux. Furthermore, the distribution of the shell script backdoor between threat actors has been identified, adding to the evidence of a network of tools and infrastructure shared or sold on the malware-as-a-service market.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-6-post-on-hacking-forum-where-malicious-tools-are-being-sold-by-the-user-asterzeu.webp\" alt=\"\" class=\"wp-image-130630 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Figure-6-post-on-hacking-forum-where-malicious-tools-are-being-sold-by-the-user-asterzeu.webp\"><figcaption class=\"wp-element-caption\">Figure 6. Post on hacking forum where malicious tools are being sold by the user &ldquo;asterzeu&rdquo;<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitigation-and-protection-guidance\">Mitigation and protection guidance<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft recommends the following steps to protect devices and networks against this threat:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Harden internet-facing devices against attacks<ul><li>Ensure secure configurations for devices: Change the default password to a strong one, and block SSH from external access.<\/li><\/ul><ul><li>Maintain device health with updates: Make sure devices are up to date with the latest firmware and patches.<\/li><\/ul><ul><li>Use least-privileges access: Use a secure virtual private network (VPN) service for remote access and restrict remote access to the device.<\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">When possible, update OpenSSH to the latest version.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Adopt a comprehensive IoT security solution such as&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-iot\">Microsoft Defender for IoT<\/a>&nbsp;to allow visibility and monitoring of all IoT and OT devices, threat detection and response, and integration with SIEM\/SOAR and XDR platforms such as Microsoft Sentinel and Microsoft 365 Defender.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Use security solutions with cross-domain visibility and detection capabilities like&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\/microsoft-365-defender\">Microsoft 365&nbsp;Defender<\/a>, which provides integrated defense across endpoints, identities, email, applications, and data.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"detections\">Detections<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-for-iot\">Microsoft Defender for IoT<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender for IoT uses detection rules and signatures to identify malicious behavior. Microsoft Defender for IoT has alerts for the use of open-source tools and exploits that may be tied to this attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-antivirus\">Microsoft Defender Antivirus<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender Antivirus detects this threat as the following malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Trojan:Linux\/SamDust!MTB<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/SamDust.D!MTB<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/SamDust.B!MTB<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/SamDust.A!MTB<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/SamDust.N!MTB<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/Reptile.A<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/Reptile.B<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/Reptile.C<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/Reptile.D<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Trojan:Linux\/Diamorphine.A!MTB<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-defender-for-endpoint\">Microsoft Defender for Endpoint<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The following Microsoft Defender for Endpoint alerts can indicate associated threat activity:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Unusual number of failed sign-in attempts<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The following alerts might also indicate threat activity related to this threat. Note, however, that these alerts can be also triggered by unrelated threat activity.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Suspicious file property modification occurred<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Suspicious termination of security tool<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Suspicious service launched<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Suspicious Linux service created<\/li>\n\n\n\n<li class=\"wp-block-list-item\">File masquerading<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"hunting-queries\">Hunting queries<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-sentinel\">Microsoft Sentinel<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with \u2018TI map\u2019) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace. More details on the Content Hub can be found here:&nbsp; <a href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy\">https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, customers can use the <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Syslog\/Analytic%20Rules\/ssh_potentialBruteForce.yaml\">SSH Brute force detection template<\/a> in the Syslog solution package to monitor for brute force attempts against their exposed SSH endpoints.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise\">Indicators of Compromise<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-regular table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Indicator<\/strong><\/td><td><strong>Type<\/strong><\/td><\/tr><tr><td>asterzeu[@]yahoo[.]com<\/td><td>Email address<\/td><\/tr><tr><td>dotsysadmin[@]protonmail[.]com<\/td><td>Email address<\/td><\/tr><tr><td>185.161.208[.]234<\/td><td>C2<\/td><\/tr><tr><td>139.180.185[.]24<\/td><td>C2<\/td><\/tr><tr><td>199.247.30[.]230<\/td><td>C2<\/td><\/tr><tr><td>149.28.239[.]146<\/td><td>C2<\/td><\/tr><tr><td>209.250.234[.]77<\/td><td>C2<\/td><\/tr><tr><td>70.34.220[.]100<\/td><td>C2<\/td><\/tr><tr><td>irc[.]socialfreedom[.]party<\/td><td>C2<\/td><\/tr><tr><td>singapore[.]sg[.]socialfreedom[.]party<\/td><td>C2<\/td><\/tr><tr><td>amsterdam[.]nl[.]socialfreedom[.]party<\/td><td>C2<\/td><\/tr><tr><td>frankfurt[.]de[.]socialfreedom[.]party<\/td><td>C2<\/td><\/tr><tr><td>sidney[.]au[.]socialfreedom[.]party<\/td><td>C2<\/td><\/tr><tr><td>losangeles[.]us[.]socialfreedom[.]party<\/td><td>C2<\/td><\/tr><tr><td>mumbaitravelers[.]org<\/td><td>C2<\/td><\/tr><tr><td>sh[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>ssh[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>dumpx[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>reg[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>sshm[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>z[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>ssho[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>sshr[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>sshu[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>user[.]madagent[.]tm<\/td><td>C2<\/td><\/tr><tr><td>madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>cler[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>dumpx[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>mh[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>ns1[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>ns2[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>ns3[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>ns4[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>reg[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>ssh[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>sshm[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>ssho[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>sshr[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>sshu[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>user[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>www[.]madagent[.]cc<\/td><td>C2<\/td><\/tr><tr><td>rsh[.]sys-stat[.]download<\/td><td>C2<\/td><\/tr><tr><td>sh[.]sys-stat[.]download<\/td><td>C2<\/td><\/tr><tr><td>sh[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>ssho[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>donate[.]xmr[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>pool[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>2018[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>blog[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>clients[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>ftp[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>psql01[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>www[.]rawdot[.]net<\/td><td>C2<\/td><\/tr><tr><td>sh[.]0xbadc0de[.]stream<\/td><td>C2<\/td><\/tr><tr><td>ss[.]0xbadc0de[.]stream<\/td><td>C2<\/td><\/tr><tr><td>a26631dcc1aef92a92d2d37476fb1e9becae54541e0411224a441d3afc20b02a<\/td><td>Script to launch ZiggyStarTux<\/td><\/tr><tr><td>6e9b692b401a57db306bd6c95409042aa6ed075088a40a6ceb74f96895116b62<\/td><td>ZiggyStarTux<\/td><\/tr><tr><td>5e11731e570fc79ad07da4f137e103e0ebfa45530fabd8fa9a9fece4e497bce0<\/td><td>ZiggyStarTux<\/td><\/tr><tr><td>22c2115becd1d0ff9dfe70d14a52ab0354e420f4bfe0df70ca0d55d3c557c6b3<\/td><td>ZiggyStarTux<\/td><\/tr><tr><td>d335c83c0dd5bc9a078e796016f9a9f845ff89ee434c63c7a2e7b360e8be3e95<\/td><td>ZiggyStarTux<\/td><\/tr><tr><td>336928c813f3c0ab9aaad5a9853ed96b3f82e7b2b6d96139a7ebb146337dd248<\/td><td>ZiggyStarTux<\/td><\/tr><tr><td>1f6a52ce5ee017f88bd5f9028e3741e69837437cc48444d31d50ef28f1ed03f4<\/td><td>ZiggyStarTux<\/td><\/tr><tr><td>b72f21077f9f4d85d555cc6c18677e285b61f980ca99d0495d52f0cbbe66517a<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>8e7c6cbbb17ffe5ea98986dd36c3e979bc348626637ff9bfd55cb08414f3494c<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>39b640f62c0046139c41bccd0f98f96165597d50c4823ed88154160c0cae6bd1<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>b77f991a9e0533a7bb39480ba7e96c29a1c1c9e2e212497cfbf6221751a196a2<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>1782930bc2d46da541c980c09b13811f504b743e485a2befb0df1e5865a95847<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>7ea1db1581afb977ec6d4abadf98660526205f23c366f7ba6aa04061762b5a7e<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>4b23d2126a6aec79396630dc10bdf279d9dafc71358145ab0b726cdf0a90dedf<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>081ad11e67af3fd98cb34cae89a5d26699f132a7ada62b1409eb85eaa4431437<\/td><td>Malicious OpenSSH<\/td><\/tr><tr><td>8ff06c7f0c105301397d15b1be3f6fe3ba081bbe042136c5b0fa4478ab59650d<\/td><td>Backdoor<\/td><\/tr><tr><td>28616594b320b492c04429ab2f569d22d56bd9a047903f214d8b0eacab9b9c14<\/td><td>Backdoor<\/td><\/tr><tr><td>e22148ae0cb1a5cc7743351909cd0ae99ba6a84e181dded1cfa9fa0ed9e4f0e2<\/td><td>Backdoor<\/td><\/tr><tr><td>6101fcda212f2ee2340e85eaac071ffa95507166ba253d555a69c9ab6c16b148<\/td><td>Backdoor<\/td><\/tr><tr><td>52fb0dcd929d57e32c8383873897963dd671b626d7e31dd98d2b092a9b57be43<\/td><td>Backdoor<\/td><\/tr><tr><td>78701d6cafb3e477a033d63b99d480c2d7647079133ecabdcb54cd7a520e46de<\/td><td>Backdoor<\/td><\/tr><tr><td>2eb5a4766dd7b90674f16eea62ba4e9c33dac8023e1692ed67c917bca448d14f<\/td><td>Backdoor<\/td><\/tr><tr><td>c775964fe1207b6a6f9faf818c63874b2bf5612581e3c3b2d9f6eeee969229d8<\/td><td>Backdoor<\/td><\/tr><tr><td>75385bb1548c567c4814ad5c13fde6bf64e47694c244e1c26e903abc4523c667<\/td><td>Backdoor<\/td><\/tr><tr><td>bc1e444ab92bb40e41e08846f3e485ffa17ab98563f2ed2129ef1b02c3d5a878<\/td><td>Backdoor<\/td><\/tr><tr><td>8cb1df542bc60eb187066c136ae413540b33dd28c856ee472dd073affb96a84b<\/td><td>Backdoor<\/td><\/tr><tr><td>55448d04183a253c939a6463c8992cbc007be237c80de92ff31e3f6606ebd470<\/td><td>Backdoor<\/td><\/tr><tr><td>9967921339799ed6f510c8a567f8bd69129d75d113f5c63612ceef0d5c4bf019<\/td><td>Backdoor<\/td><\/tr><tr><td>0a565ebae65fb5fbb34801c2948d35a0b7b5762a9ce51bd55a43181f46bc9723<\/td><td>Backdoor<\/td><\/tr><tr><td>fdfed7c2bf55d0f2440f623e265ab8b8006987f94d23982688914feffb3c549e<\/td><td>Backdoor<\/td><\/tr><tr><td>32aa3e5fd9b79dcfd9ebe590b6784527cb17217cdeb61a1791bd4a5f721f0099<\/td><td>vars.sh archive<\/td><\/tr><tr><td>30d456d6dbd492923972d5f3ceb72c0f7e80d1f6391d6f9c0f5e889b6f71be66<\/td><td>vars.sh archive<\/td><\/tr><tr><td>74f4b030529435a8872c3e10d3341a1988d4fdbba89d9afd876458980f6f7a49<\/td><td>vars.sh archive<\/td><\/tr><tr><td>3033bb18554ce62f2f96338af682efb647c98d126734bb20426da8ec49ec1cdd<\/td><td>Decode utility used by the backdoor<\/td><\/tr><tr><td>58b9622960e1bb189a403da6cd73e6ec2cb446680a18092351e5a9fa1a205cbc<\/td><td>ss.patch<\/td><\/tr><tr><td>0027edb4a3c33f3d0cb5cc6fc85b58a8f7c70b8e57a2d28bed53f11c5f649848<\/td><td>inst.sh<\/td><\/tr><tr><td>7ca66932d9015bf14b89b8650408e39a65c96f59f9273feaede28cabca8a3bbc<\/td><td>hive-start.tgz<\/td><\/tr><tr><td>9564172445e66f0d3cb64c42f2298f14093c342b95b023bcb82408b6f2a66cd3<\/td><td>lssh.tgz<\/td><\/tr><tr><td>722b1970caa804154d85fb3dba88cf192bf3eedd2fea40c8c49c98130797649d<\/td><td>File from lssh.tgz<\/td><\/tr><tr><td>85877eb8f60c903ccb256e776c3e077295cf10eccff8d8ce4400edc699e8021f<\/td><td>File from lssh.tgz<\/td><\/tr><tr><td>635b3dfadeab6b3c2574b1689607b776518d42c2b9fdb895e25c04a8ae9dee92<\/td><td>File from lssh.tgz<\/td><\/tr><tr><td>3ba302f533fcf065fe3f80b4bbea4653e86a5a8c1c752e4798a64a6be3d06e5d<\/td><td>File from lssh.tgz<\/td><\/tr><tr><td>b8a360e7094e27857c7daacf624f2d9916e002201caf8a88c5aa3bd37f7bc264<\/td><td>File from lssh.tgz<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em><strong>Rotem Sde-Or<\/strong>, Microsoft Threat Intelligence Community<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"further-reading\">Further reading<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: <a href=\"https:\/\/aka.ms\/threatintelblog\">https:\/\/aka.ms\/threatintelblog<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To get notified about new publications and to join discussions on social media, follow us on Twitter at <a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/MsftSecIntel<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has uncovered an attack leveraging custom and open-source tools to target internet-facing IoT devices and Linux-based systems. The attack involves deploying a patched version of OpenSSH on affected devices to allow root login and the hijack of SSH credentials.<\/p>\n","protected":false},"author":188,"featured_media":130657,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[125390,125253,124875,124083],"footnotes":""},"post_tag":[3920,3782],"threat-intelligence":[3727,3733],"content-type":[3663],"job-role":[],"product":[3690,3694,3699,3726],"topic":[3687],"coauthors":[3380],"class_list":["post-130622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-cryptojacking","tag-linux","threat-intelligence-attacker-techniques-tools-and-infrastructure","threat-intelligence-iot-ot-threats","content-type-research","product-microsoft-defender","product-microsoft-defender-for-endpoint","product-microsoft-defender-for-iot","product-microsoft-sentinel","topic-threat-intelligence","review-flag-1694638272-264","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-4-1694638266-512","review-flag-5-1694638266-171","review-flag-6-1694638266-691","review-flag-8-1694638266-352","review-flag-disable","review-flag-inter-1694638272-721","review-flag-iot-1694638272-473","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoT devices and Linux-based systems targeted by OpenSSH trojan campaign | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-22T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T08:57:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/IoT-openssh-trojan-attack-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1682\" \/>\n\t<meta property=\"og:image:height\" content=\"842\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/IoT-openssh-trojan-attack-social.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign\",\"datePublished\":\"2023-06-22T16:00:00+00:00\",\"dateModified\":\"2025-06-18T08:57:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/\"},\"wordCount\":2881,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg\",\"keywords\":[\"Cryptojacking\",\"Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/\",\"name\":\"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg\",\"datePublished\":\"2023-06-22T16:00:00+00:00\",\"dateModified\":\"2025-06-18T08:57:20+00:00\",\"description\":\"Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg\",\"width\":640,\"height\":427,\"caption\":\"Two women and one man join an in-person meeting in a medium sized conference room with a companion device. One woman is casting from her mobile device while standing at the back of the room.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/93fc9a53179521471e140a995838f24d\",\"name\":\"Joahnna Marie Hipolito\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/baa3596fb878da90497b001bb4dc1409107db9785eb3328903fc5f30cabbc451?s=96&d=microsoft&r=gb272e9a977faa7fdcfad656e85152917\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/baa3596fb878da90497b001bb4dc1409107db9785eb3328903fc5f30cabbc451?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/baa3596fb878da90497b001bb4dc1409107db9785eb3328903fc5f30cabbc451?s=96&d=microsoft&r=g\",\"caption\":\"Joahnna Marie Hipolito\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-johipolito\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign | Microsoft Security Blog","description":"Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/","og_locale":"en_US","og_type":"article","og_title":"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign | Microsoft Security Blog","og_description":"Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/","og_site_name":"Microsoft Security Blog","article_published_time":"2023-06-22T16:00:00+00:00","article_modified_time":"2025-06-18T08:57:20+00:00","og_image":[{"width":1682,"height":842,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/IoT-openssh-trojan-attack-social.png","type":"image\/png"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/IoT-openssh-trojan-attack-social.png","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign","datePublished":"2023-06-22T16:00:00+00:00","dateModified":"2025-06-18T08:57:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/"},"wordCount":2881,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg","keywords":["Cryptojacking","Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/","name":"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg","datePublished":"2023-06-22T16:00:00+00:00","dateModified":"2025-06-18T08:57:20+00:00","description":"Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/06\/Featured_M365CO22_Rally_007.jpg","width":640,"height":427,"caption":"Two women and one man join an in-person meeting in a medium sized conference room with a companion device. One woman is casting from her mobile device while standing at the back of the room."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/22\/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"IoT devices and Linux-based systems targeted by OpenSSH trojan campaign"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/93fc9a53179521471e140a995838f24d","name":"Joahnna Marie Hipolito","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/baa3596fb878da90497b001bb4dc1409107db9785eb3328903fc5f30cabbc451?s=96&d=microsoft&r=gb272e9a977faa7fdcfad656e85152917","url":"https:\/\/secure.gravatar.com\/avatar\/baa3596fb878da90497b001bb4dc1409107db9785eb3328903fc5f30cabbc451?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/baa3596fb878da90497b001bb4dc1409107db9785eb3328903fc5f30cabbc451?s=96&d=microsoft&r=g","caption":"Joahnna Marie Hipolito"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-johipolito\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/130622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=130622"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/130622\/revisions"}],"predecessor-version":[{"id":139506,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/130622\/revisions\/139506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/130657"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=130622"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=130622"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=130622"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=130622"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=130622"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=130622"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=130622"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=130622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}