In the post, the researchers share how “malicious actors deploy code that removes applications and services present mainly in Huawei Cloud.”
We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won’t take more than 60 seconds of your time, and we’d hugely appreciate if you’d share your experiences with us.
Analyzing the modus operandi of the attackers leads TrendMicro to believe that the threat actors are going after Amazon Elastic Cloud Service (ECS) instances inside Huawei Cloud.
Weeding out competition
The researchers note that the malware disables the hostguard service, a Huawei Cloud Linux agent process whose purpose is to detect and flag any security issues.
Moreover, the malware contains an open source plugin agent that’s designed to allow Huawei Cloud users to reset a password to their ECS instances.
“As threat actors have these two services present in their shell scripts, we can assume that they are specifically targeting vulnerable ECS instances inside Huawei Cloud,” explain TrendMicro researchers Alfredo Oliveira, and David Fiser.
In their analysis of the malware, the researchers note that interestingly it puts in the time and effort to search for and terminate any other malware running on the attacked cloud environment.
“More than any other samples and campaigns we’ve seen so far, this campaign performs a comprehensive sanitization of the operation system. It looks for both signs of previous infections and for security tools that could stop its malicious routines,” the researchers comment.
The researchers have shared their analysis with Huawei, but have yet to get a response.