Thursday, July 4, 2024

New Hadoop and Flink Hacks Leveraging Recognized Configuration Vulnerability

(Golden Dayz/Shutterstock)

Safety researchers at Aqua Nautilus say they’re monitoring a brand new set of assaults in opposition to Apache Hadoop and Apache Flink purposes. The attackers are using stealthy strategies to use a identified safety vulnerability for misconfigured Hadoop and Flink programs that might allow unauthenticated hackers to run arbitrary code on clusters, the researchers say.

Aqua Nautilus, a safety analysis firm based mostly in Burlington, Vermont, at this time introduced the outcomes of its investigation into the Hadoop and Flink assaults. The corporate said that, over the previous few weeks, it found a “new and fascinating assault” that focused its cloud honeypots. The assaults on Hadoop and Flink seem to comply with an analogous playbook and exploit comparable vulnerabilities, the corporate says.

On Hadoop, the assault leverages a consumer misconfiguration in ResourceManager, or the top node for YARN in a Hadoop cluster. “This misconfiguration may be exploited by an unauthenticated, distant attacker by means of a specifically designed HTTP request, probably resulting in the execution of arbitrary code, relying on the privileges of the consumer on the node the place the code is executed,” Aqua Nautilus safety analysts Nitzan Yaakov and Assaf Morag wrote in a weblog publish at this time.

In the meantime, the assaults on Apache Flink additionally exploit a misconfiguration “that enables a distant attacker to execute arbitrary code on a system working Apache Flink with no need to authenticate,” Aqua Nautilus stated.

Neither of the misconfiguration-based vulnerabilities are new, the corporate says. In actual fact, it says it has reported on the issues up to now. Nonetheless, the assault vectors themselves seem like new, and the truth that they’re using stealthy strategies, akin to utilizing packers and rootkits to hide their malware, make the assaults noteworthy, the corporate says.

On Hadoop, attackers start their work by sending an unauthenticated request to deploy a brand new software, adopted by a POST request to execute arbitrary code, the corporate says. The payload is a binary known as “dca,” which additional downloads two different binaries for rootkits in addition to a cryptominer known as Monero, Aqua Nautilus says.

The assault employs subtle protection evasion strategies, akin to using “packed ELF binaries and rootkits which might be undetected by common safety options,” the safety researchers say. “The malware deletes contents of particular directories and modifies system configurations to evade detection.” There may be additionally a persistence mechanism that makes use of cron jobs to obtain and execute a script that deploys the “dca” binary, the corporate says. .

The unhealthy guys using this method make the most of particular IP addresses and domains, Aqua Nautilus says, which can assist victims inform in the event that they’ve been hacked. Agent-based safety instruments designed to detect suspicious and malicious habits can be used to detect “cryptominers, rootkits, obfuscated or packed binaries, in addition to container drift,” the safety firm says, including that prospects who deployed its CNAPP agent-based runtime resolution are protected against these sorts of assaults.

Apache Hadoop is a distributed framework used for storing and analyzing giant knowledge units. Whereas the height of Hadoop recognition has handed, there are possible 1000’s of Hadoop clusters nonetheless working and offering worth to organizations. Apache Flink, in the meantime, is a distributed framework for constructing streaming purposes. Adoptino of the Flink framework remains to be rising.

For extra technical particulars concerning the Hadoop and Flink exploits, try this weblog publish on the Aqua Nautilus web site.

Associated Gadgets:

Buckle Up: It’s Time for 2024 Safety Predictions

From WormGPT to DarkBERT, GenAI Boosting Cybercriminal Capabilities

Is Hadoop Formally Useless?

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles