Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Exposed Jupyter Notebooks Targeted for Cryptomining

Type
Campaign
Actors
❓Unknown
Pub. date
March 16, 2025
Initial access
Software misconfig
Impact
Resource hijacking
Observed techniques
UPX packingJupyter Notebook misconfig abuse
Observed tools
C3Pool
Targeted technologies
Jupyter Notebook
References
https://www.cadosecurity.com/blog/jupyter-notebooks-cryptominer
Status
Finalized
Last edited
Mar 16, 2025 2:29 PM

Cado Security Labs has uncovered a cryptomining campaign exploiting misconfigured Jupyter Notebooks, affecting both Windows and Linux environments. The attackers use Jupyter as an entry point to deploy a cryptominer through a series of evasive techniques. On Windows, the attack chain begins with retrieving an MSI file that executes a binary named Binary.freedllBinary. This binary loads a secondary payload (java.exe), which masquerades as a Java Platform binary while retrieving and decrypting an additional payload (x2.dat) from repositories like GitHub, Launchpad, and Gitee. The final stage delivers a cryptominer that mines multiple cryptocurrencies, including Monero and Sumokoin. If the MSI execution fails, the attack falls back on a JavaScript backdoor (0217.js), which fetches Linux ELF binaries and installs them using cron jobs.

The Linux variant follows a similar approach but uses bash scripts (0217.js) to deploy 0218.elf and 0218.full. The binaries retrieve encrypted mining payloads (lx.dat), decrypt them using ChaCha20, and execute the miner. The campaign also includes a PHP-based infection mechanism (1.php), which delivers platform-specific cryptomining binaries depending on the operating system. The attackers leverage cloud-based misconfigurations to infiltrate systems, host payloads on repositories like GitHub and Gitee, and set up persistence through cron jobs. Similar tactics have been seen in previous campaigns targeting Ivanti Connect Secure and Korean web servers.

Made with 💙 by Wiz

Last Updated: April 3, 2025