Microsoft discovers Windows/Linux botnet used in DDoS attacks

Cartoon image of a desktop computer under virus attack.

Microsoft researchers have discovered a Windows-Linux hybrid botnet that uses a highly efficient technique to bring it down Minecraft server and performs distributed denial-of-service attacks on other platforms.

Dubbed MCCrash, the botnet infects Windows machines and devices running various distributions of Linux for use in DDoS attacks. Among the commands accepted by the botnet software is one called ATTACK_MCCRASH. This command populates the username in a Minecraft server login page with ${env:random payload of specific size:-a}. The string exhausts the server’s resources and causes it to crash.

A packet capture showing the TCP payload for crashing servers <em>Minecraft</em>.” src=”https://cdn.arstechnica.net/wp-content/uploads/2022/12/mccrash-tcp-payload-640×50.png” width=”640″ height=”50″ srcset=”https: //cdn.arstechnica.net/wp-content/uploads/2022/12/mccrash-tcp-payload.png 2x”/><figcaption class=
Zoom in / A packet capture showing the TCP payload for the crash Minecraft server.

Microsoft

“The use of env variable triggers the use of the Log4j 2 library, which causes abnormal consumption of system resources (unrelated to the Log4Shell vulnerability), demonstrating a specific and highly efficient DDoS method,” Microsoft researchers wrote. “A wide range of versions of the Minecraft server may be affected.”

Currently, MCCrash is hardcoded to target version 1.12.2 only Minecraft server software. The attack technique, however, will block servers running versions 1.7.2 through 1.18.2, which handle about half of the Minecraft server. If the malware is updated to target all vulnerable versions, its reach could be much wider. A change in Minecraft server version 1.19 prevents the attack from working.

“The wide range of subjects at risk Minecraft server highlights the impact this malware could have had had it been specifically coded to affect versions later than 1.12.2,” Microsoft researchers wrote. part of the botnet substantially increases its impact and reduces its chances of being detected.”

The initial infection point for MCCrash is Windows machines that have software installed that claims to provide pirated licenses for the Microsoft operating system. Code hidden in downloaded software surreptitiously infects the device with malware that installs malign.py, a Python script that provides the core logic for the botnet. Infected Windows devices then scan the internet for Debian, Ubuntu, CentOS and IoT devices that accept SSH connections.

Trojanized cracking tools that install MCcrash.
Zoom in / Trojanized cracking tools that install MCcrash.

Microsoft

Once found, MCCrash uses the common default login credentials in an attempt to run the same malign.py script on the Linux device. Both Windows and Linux devices are therefore part of a botnet running the Minecraft attack as well as other forms of DDoS. The graph below shows the attack flow.

Microsoft

A breakdown of MCCrash-infected devices shows that most of them are located in Russia. Microsoft hasn’t said how many devices are infected. Company researchers said they believe botnet operators are using it to sell DDoS services on criminal forums.

Leave a Reply

Your email address will not be published. Required fields are marked *