Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Proxyjacking and Cryptomining Campaign Targets GitLab
Proxyjacking and Cryptomining Campaign Targets GitLab
Security

Proxyjacking and Cryptomining Campaign Targets GitLab

September 24, 2023No Comments2 Mins Read

Security researchers have discovered a new financially motivated cyber-threat campaign designed to make money from cryptomining and proxyjacking while staying hidden using a variety of techniques.

The Labrat campaign was discovered by a team at Sysdig, who observed the threat actors compromise a targeted container via legacy GitLab remote code execution vulnerability CVE-2021-22205.

The end goal is to make money by cryptomining and proxyjacking; the latter being attacks where threat actors rent out a compromised system to a proxy network.

To maintain this revenue stream, the threat group are going to extreme lengths to stay hidden from researchers and network defenders, Sysdig claimed.

“It is common to see attackers utilize scripts as their malware because they are simpler to create. However, this attacker chose to use undetected compiled binaries, written in Go and .NET, which allowed the attacker to hide more effectively,” the security vendor explained.

“Furthermore, the attacker abused a legitimate service, TryCloudFlare, to obfuscate their C2 network.”

Read more on stealthy crypto attacks: Satacom Malware Campaign Steals Crypto Via Stealthy Browser Extension

Moreover, the attackers are constantly updating their binaries in order to avoid detection, Sysdig claimed.

To maintain persistence, the Labrat attackers use a legitimate open-source tool known as Global Socket (GSocket).

“Much like Netcat, GSocket has legitimate uses, but of course it can also be used by attackers,” Sysdig wrote.

“Unlike Netcat, GSocket provides features such as a custom relay or proxy network, encryption, and the ability to use TOR, making it a very capable tool for stealthy C2 communications. To remove evidence of its installation, the LABRAT attacker tried to hide the process.”

See also  HBAR Price Prediction: Targets $0.116 by April 2026 as Technical Indicators Show Mixed Signals

The campaign is ongoing and may even be designed to go beyond proxyjacking and cryptomining, given that the backdoor used provides access to compromised systems, the research team concluded.

“Users impacted by CVE-2021-22205 should follow their organization’s security incident and disaster recovery processes to deprovision the compromised instance and restore the latest good working backup to a new GitLab instance,” noted a GitLab statement sent to Infosecurity.

“The vulnerability has been patched since 2021 and the impact is on customers who remain on vulnerable versions. We issued a blog post regarding the vulnerability and a forum post about how users can determine if they have been impacted.”

Editorial image credit: T. Schneider / Shutterstock.com

Source link

Campaign Cryptomining GitLab Proxyjacking Targets

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Prediction markets are ditching the 'casino' label to become a regular part of how people track the news

May 2, 2026

Bitcoin-friendly El Salvador can become ‘Singapore of the Americas’: VanEck advisor

October 29, 2023

Kalshi secures license to offer margin trading to institutional investors

March 29, 2026

Type above and press Enter to search. Press Esc to cancel.