Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Qubitstrike Crypto Mining and Rootkit Campaign

Type
Campaign
Actors
❓Unknown
Pub. date
October 18, 2023
Initial access
Software misconfig
Impact
Resource hijacking
Observed techniques
Misconfigured Consul abuseCredential theftCreate SSH backdoor
Observed tools
Diamorphine rootkit
Targeted technologies
Jupyter Notebook
References
https://www.cadosecurity.com/qubitstrike-an-emerging-malware-campaign-targeting-jupyter-notebooks/https://thehackernews.com/2023/10/qubitstrike-targets-jupyter-notebooks.htmlhttps://www.csoonline.com/article/656288/cryptojacking-campaign-qubitstrike-targets-exposed-jupyter-notebook-instances.html
Status
Finalized
Last edited
Jun 2, 2024 12:00 PM

Qubitstrike is a cryptojacking campaing targeting exposed Jupyter Notebooks, as they may allow to execute commands remotely. After obtaining a shell on the remote host, the shell script executes a cryptocurrency miner and establishes persistence using a cron job that inserts a key to .ssh/authorized_keys file.

In addition, the malware is also capable of retrieving and installing the Diamorphine rootkit to conceal malicious processes and transmitting captured AWS and Google cloud credentials back to the threat actor through Telegram bot API. The payloads for this campaign are all hosted on ‘codeberg.org’. A closer examination of the repository has also revealed a python implant that’s engineered to be executed on infected hosts, with Discord acting as C2 mechanism.

The origin of the threat actor remain unclear, although evidence points to it likely being Tunisia owning to the IP address used to login to the cloud honeypot using the stolen credentials.

Made with 💙 by Wiz

Last Updated: April 3, 2025