No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Attacker Targets Hadoop YARN, Flint Servers in Stealthy Campaign

January 11, 2024
in Protection
0
Attacker Targets Hadoop YARN, Flint Servers in Stealthy Campaign


A threat actor is targeting a common misconfiguration in Hadoop YARN and Apache Flink to try and drop Monero cyrptominers in environments running the two big data technologies.

What makes the campaign especially notable is the adversary’s use of sophisticated evasion techniques, such as rootkits, packed ELF binaries, directory content deletion, and system configuration modifications to bypass typical threat detection mechanisms.

Known Misconfigurations

Researchers from Aqua Nautilus uncovered the campaign when they spotted new attacks hitting one of their cloud honeypots recently. One attack exploited a known misconfiguration in a feature in Hadoop YARN called ResourceManager that manages resources for applications running on a Hadoop cluster. The other targeted a similarly known misconfiguration in Flink that, like the YARN issue, gives attackers a way to run arbitrary code on affected systems.

Hadoop YARN (Yet Another Resource Negotiator) is a resource management subsystem of the Hadoop ecosystem for big data processing. Apache Flink is a relatively widely used open source stream and batch processor for event-driven data analytics and data pipeline applications.

Assaf Morag, lead researcher for Aqua Nautilus, says the YARN misconfiguration gives attackers a way to send an unauthenticated API request to create new applications. The Flink misconfiguration allows an attacker to upload a Java archive (JAR) file that contains malicious code to a FLINK server.

“Both misconfigurations permit remote code execution, implying that an attacker could potentially gain complete control over the server,” Morag says. Given that these servers are used for data processing, their misconfigurations present a data exfiltration risk. “Furthermore, these servers are typically interconnected with other servers within the organization, which could facilitate lateral movement by the attacker,” Morag says.

Deploying a Cryptominer

In the attack on Apache Nautilus’ honeypots, the adversary exploited the misconfiguration in Hadoop YARN to send an unauthenticated request to deploy a new application. The attacker was then able to execute remote code on the misconfigured YARN by sending a POST request, asking it to launch the new application using the attacker’s command. To establish persistence, the attacker first deleted all cron jobs — or scheduled tasks — on the YARN server and created a new cron job.

Aqua’s analysis of the attack chain showed the attacker using the command to delete the content of the /tmp directory on the YARN server, downloading a malicious file to the /tmp directory from a remote command-and-control server, executing the file, and then again deleting the contents of the directory. Aqua researchers found the secondary payload from the C2 server to be a packed ELF (Executable and Linkable Format) binary that served as a downloader for two different rootkits, one of which was a Monero crypto-currency miner. Malware detection engines on Virus Total did not detect the secondary ELF binary payload, Aqua said.

“As these servers are designed for processing big data, they possess high CPU capabilities,” Morag says. “The attacker is exploiting this fact to run cryptominers, which also require a substantial amount of CPU resources.”

Morag says the attack is noteworthy for the different techniques the attacker used to conceal their malicious activity. These included the use of a packer to obfuscate the ELF binary, the use of stripped payloads to make analysis more challenging, an embedded payload within the ELF binary, file and directory permissions modifications, and the use of two rootkits to hide the cryptominer and shell commands.



Editorial Team

Editorial Team

Related Posts

What's New on Netflix in April 2026
Protection

What's New on Netflix in April 2026

March 26, 2026
The Suunto Run Budget Running Watch Is Even Cheaper During Amazon's Big Spring Sale
Protection

The Suunto Run Budget Running Watch Is Even Cheaper During Amazon’s Big Spring Sale

March 26, 2026
Google's Pixel 9a Is Just $399 for the Amazon Big Spring Sale
Protection

Google’s Pixel 9a Is Just $399 for the Amazon Big Spring Sale

March 26, 2026
This Heart Rate Monitor Is Widely Regarded As the Best, and It’s 27% Off During Amazon’s Big Spring Sale
Protection

This Heart Rate Monitor Is Widely Regarded As the Best, and It’s 27% Off During Amazon’s Big Spring Sale

March 26, 2026
My Favorite JBL Over-Ear Headphones Are $100 Off During Amazon's Big Spring Sale
Protection

My Favorite JBL Over-Ear Headphones Are $100 Off During Amazon's Big Spring Sale

March 26, 2026
Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It's $140 Off During Amazon's Big Spring Sale
Protection

Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It’s $140 Off During Amazon’s Big Spring Sale

March 26, 2026
Load More
Next Post
Google Trims Hundreds of Jobs as It Marshalls Resources for AI 

Google Trims Hundreds of Jobs as It Marshalls Resources for AI 

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • Epstein’s Alleged Bitcoin, Crypto Investments Surface In Newly Released DOJ Files

    0 shares
    Share 0 Tweet 0
  • Trump says combat operations in Iran will continue until all objectives achieved

    0 shares
    Share 0 Tweet 0
  • Yen under pressure after Takaichi report; Aussie higher on inflation

    0 shares
    Share 0 Tweet 0
  • US gasoline prices to rise after attack on Iran, analysts warn

    0 shares
    Share 0 Tweet 0

Latest News

Jefferies takes $10m hit after writing down First Brands exposure

Jefferies takes $10m hit after writing down First Brands exposure

March 26, 2026
0

Jefferies Financial Group has written down its financial exposure to collapsed US car parts supplier First Brands to zero, taking...

What's New on Netflix in April 2026

What's New on Netflix in April 2026

March 26, 2026
0

Netflix's April lineup is packed with something for everyone. There are new installments of reality series Million Dollar Secret (April...

Charles Hoskinson Cardano news

Cardano Founder Says This Deal Could Bring Billions In TVL

March 26, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Cardano founder Charles Hoskinson says Midnight’s new...

Your portfolio soared on cheap risk — but that’s over now

Your portfolio soared on cheap risk — but that’s over now

March 26, 2026
0

Investors are waking up to the harsh realities and the financial penalties of a reordered, reactionary world.

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.