TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SaltStack Mining Attack

157 pointsby photon-torpedoabout 5 years ago

12 comments

alexandercrohdeabout 5 years ago
&gt;&gt;&gt; If you&#x27;re here, chances are you&#x27;re already compromised.<p>WTF does that mean? Our salt implementation is on an entirely private network, so why would I be more likely than not to be compromised already?<p>----<p>Edit: Re-downvotes -- This is a sincere question. Is there some evidence that the majority of salt implementations are compromised, or some mechanism by which this hits private networks? Or is that line just for dramatic effect?
评论 #23082352 未加载
评论 #23087704 未加载
评论 #23081434 未加载
评论 #23082123 未加载
formersaltuserabout 5 years ago
SaltStack has a long history of home brew protocols, internally written encryption, security issues, and bugs. I&#x27;m not surprised they would end up being used as a vector for attacks.
评论 #23082520 未加载
评论 #23083666 未加载
评论 #23082836 未加载
评论 #23083184 未加载
评论 #23081752 未加载
评论 #23082291 未加载
nerdbaggyabout 5 years ago
We all got lucky on this one. The outcome could of been much worse, like secret leaking and rm -rf. We record everything that saltstack does and the scripts didn’t even upload anything from the infected servers.
评论 #23086729 未加载
lndarjabout 5 years ago
Our server were affected. They added a cronjob which ran every minute wgetting a .sh file and executing it. Most of the time the server which the file was in was either offline or returned 404, but every once in a while it returned the malicious script. When this script got executed, it killed our nginx server, which is how we noticed something odd was happening. If it wasn&#x27;t for nginx dying, we might have not even noticed we were infected.<p>Here&#x27;s the contents of the sh script for the curious. <a href="https:&#x2F;&#x2F;pastebin.com&#x2F;CbupwQMG" rel="nofollow">https:&#x2F;&#x2F;pastebin.com&#x2F;CbupwQMG</a>
评论 #23086295 未加载
评论 #23085602 未加载
lol768about 5 years ago
This hit RamNode too.<p>&gt; This message is to customers with VPSs on our legacy SolusVM system.<p>&gt; At approximately 20:34 eastern (GMT -4) on May 2, recently published SaltStack vulnerabilities (CVE-2020-11651, CVE-2020-11652) were used to launch cryptocurrency miners on our SolusVM host nodes. The attack disrupted various services in order to allocate as much CPU as possible to the miners. SSH and QEMU processes were killed on some of our CentOS 6 KVM hosts, causing extended downtime in certain cases.<p>&gt; Upon detecting the disruption, we quickly began to re-enable SSH, disable and remove Salt, kill related processes, and boot shutdown KVM guests. After careful analysis of the exploit used, we do not believe any data was compromised.<p>&gt; RamNode was not specifically targeted, but rather anyone running SaltStack versions prior to the one released a few days ago (April 29).
评论 #23083794 未加载
scblznabout 5 years ago
Algolia got impacted too, apparently their Salt masters were opened to the whole internet: <a href="https:&#x2F;&#x2F;blog.algolia.com&#x2F;salt-incident-may-3rd-2020-retrospective-and-update&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.algolia.com&#x2F;salt-incident-may-3rd-2020-retrospe...</a>
评论 #23083384 未加载
docsapp_ioabout 5 years ago
This impacted ghost.org hosting really bad <a href="https:&#x2F;&#x2F;status.ghost.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;status.ghost.org&#x2F;</a>
评论 #23081886 未加载
rhakyrabout 5 years ago
Debian hasn&#x27;t fixed this yet in their packaging so you might want to work around that if you are using that as a salt-master server.<p><a href="https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2020-11651" rel="nofollow">https:&#x2F;&#x2F;security-tracker.debian.org&#x2F;tracker&#x2F;CVE-2020-11651</a>
willjpabout 5 years ago
I&#x27;m so grateful this happened over the weekend, when I had time to respond. My girlfriend woke me up and told me the CPU-fan was going crazy in the living room. I realize this isn&#x27;t the case for everyone. I extend my deepest consolations to those affected.
tormehabout 5 years ago
Former SaltStack user here. If you&#x27;re using it, just stop. Switch to Ansible, a Kubernetes&#x2F;Helm&#x2F;Flux solution or experiment with Chef Habitat if you&#x27;re feeling futuristic. SaltStack is just bad. It&#x27;s buggy, clunky and has really bad error messages. Its only saving grace is that it came before Ansible, but that&#x27;s only relevant in a historical context. Just no.
评论 #23084020 未加载
评论 #23084986 未加载
评论 #23084207 未加载
circlingthesunabout 5 years ago
We got hit by this on Saturday night :|
theszabout 5 years ago
How does things like these affect Monero&#x27;s reputation?<p>I saw Monero mining in JS libraries, now it is in virus form.<p>Thus, why Monero? Does Monero somehow discourage these &quot;practices&quot;?
评论 #23082170 未加载
评论 #23086107 未加载
评论 #23082169 未加载