GoScanSSH Worm
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
Initial access is gained using a list of credentials, with unique malware binaries used to infect a target device. GoScanSSH will then attempt to determine the number of hash computations the device can perform in a fixed interval, defining how powerful it is. This data, along with further information regarding the device, is sent to a command and control server (C2).
C2 communications are sent using the Tor2Web proxy, allowing systems to access resources on the Tor network without a Tor client. Messages are encrypted using the AES algorithm with randomly generated keys. These keys are further encrypted using asymmetric RSA encyrption, with the public key hard-coded into the binary.
GoScanSSH is capable of scanning and infecting other vulnerable SSH servers using randomly generated IP addresses. These are compared to a list of ranges known to be controlled by government or military entities and if no match is found, GoScanSSH will initiate an attack.
Remediation advice
To avoid becoming infected, ensure that:Remediation steps
| Type | Step |
|---|---|
Administrators should ensure that all vital systems are not directly exposed to the Internet. Additionally, strong password and account policies are enforced for all accounts that have access to management interfaces over SSH. |
Last edited: 17 February 2020 12:44 pm