Stopping Sobolan Malware with Aqua Runtime Protection
March 12, 2025, 11:55 a.m.
Description
A new attack campaign targeting interactive computing environments like Jupyter Notebooks has been discovered. The attack involves downloading a compressed file from a remote server, which, when executed, deploys multiple malicious tools to exploit the server and establish persistence. The campaign poses a significant risk to cloud-native environments by enabling unauthorized access and long-term control over compromised systems. The attack flow includes initial access through an unauthenticated JupyterLab instance, downloading and extracting malicious files, executing scripts to launch additional binaries, and establishing persistence while evading detection. The malware deploys cryptominers and attempts to kill competing processes. Runtime protection solutions can effectively detect, block, and mitigate these threats using real-time threat intelligence, malware scanning, and customizable policies.
Tags
Date
- Created: March 12, 2025, 11:48 a.m.
- Published: March 12, 2025, 11:48 a.m.
- Modified: March 12, 2025, 11:55 a.m.
Indicators
- e36d2943292d410548abc012f6e0ae8f724b4910d053fcf1cca9ebd378742028
- decd1f03573fe4b7171af8edd3c342799be4e6b4431ed8c2a6ed9c3728af5bad
- c597b7bee35070139865404bd0d6a940b2cfb32a994525494e6e01695a690f31
- bd8a77f63439dd7bc7e7da339ec4a9c097e5b316d42a0941b78b93a0bf664892
- 058fa7b2e8e5e9809c2f9a574bf7e630a4455c0a26c948b798019d265b6510d3
- 37d699798e777618260b07653d85a36d06725b29cb31a30242b2a9042ad3ceee
- 167.172.154.218
- 37.201.213.226
- http://167.172.154.218/.sobo/temp.tar