Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

SEC Under Atkins Resets Crypto Policy With Focus on Clarity and Growth

April 22, 2026

Adswerve Named 2026 Adobe Customer Experience Orchestration Emerging Partner of the Year, Americas, for Third Consecutive Year

April 21, 2026

B.AI Teams Up with Biconomy to Expand Security and Global Access for AI

April 21, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»Proxyjacking and Cryptomining Campaign Targets GitLab
Proxyjacking and Cryptomining Campaign Targets GitLab
Security and Privacy

Proxyjacking and Cryptomining Campaign Targets GitLab

August 18, 2023No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Security researchers have discovered a new financially motivated cyber-threat campaign designed to make money from cryptomining and proxyjacking while staying hidden using a variety of techniques.

The Labrat campaign was discovered by a team at Sysdig, who observed the threat actors compromise a targeted container via legacy GitLab remote code execution vulnerability CVE-2021-22205.

The end goal is to make money by cryptomining and proxyjacking; the latter being attacks where threat actors rent out a compromised system to a proxy network.

To maintain this revenue stream, the threat group are going to extreme lengths to stay hidden from researchers and network defenders, Sysdig claimed.

“It is common to see attackers utilize scripts as their malware because they are simpler to create. However, this attacker chose to use undetected compiled binaries, written in Go and .NET, which allowed the attacker to hide more effectively,” the security vendor explained.

“Furthermore, the attacker abused a legitimate service, TryCloudFlare, to obfuscate their C2 network.”

Read more on stealthy crypto attacks: Satacom Malware Campaign Steals Crypto Via Stealthy Browser Extension

Moreover, the attackers are constantly updating their binaries in order to avoid detection, Sysdig claimed.

To maintain persistence, the Labrat attackers use a legitimate open-source tool known as Global Socket (GSocket).

“Much like Netcat, GSocket has legitimate uses, but of course it can also be used by attackers,” Sysdig wrote.

“Unlike Netcat, GSocket provides features such as a custom relay or proxy network, encryption, and the ability to use TOR, making it a very capable tool for stealthy C2 communications. To remove evidence of its installation, the LABRAT attacker tried to hide the process.”

See also  Cryptojacking Campaign Targets DevOps Servers Including Nomad

The campaign is ongoing and may even be designed to go beyond proxyjacking and cryptomining, given that the backdoor used provides access to compromised systems, the research team concluded.

Editorial image credit: T. Schneider / Shutterstock.com

Source link

campaign Cryptomining GitLab Proxyjacking Targets
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Ripple new roadmap targets full quantum security transition by 2028 – Why it matters

April 21, 2026

How crypto futures markets are feeding ‘scam coin’ insider pump and dumps

April 21, 2026

Oil tanker attacked after falling for crypto scam granting fake Strait of Hormuz safe passage

April 21, 2026

North Korean Blamed for $290m KelpDAO Crypto Heist

April 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

US Regulator Says Bank Will Pay $1,500,000 Settlement for Allegedly Overcharging and Deceiving Hundreds of Customers in Veterans’ Loan Scandal

May 27, 2024

Bitcoin’s Computing Power May Hit a Major Milestone Long Before Next Halving

January 3, 2025

Nftperp Shuts Down V1 Beta, Promising Thrilling Launch Of V2

July 7, 2023

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

SEC Under Atkins Resets Crypto Policy With Focus on Clarity and Growth

April 22, 2026

Adswerve Named 2026 Adobe Customer Experience Orchestration Emerging Partner of the Year, Americas, for Third Consecutive Year

April 21, 2026

B.AI Teams Up with Biconomy to Expand Security and Global Access for AI

April 21, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$76,187.000.00%
  • ethereumEthereum(ETH)$2,316.17-0.41%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.43-0.13%
  • binancecoinBNB(BNB)$631.55-0.06%
  • usd-coinUSDC(USDC)$1.00-0.02%
  • solanaSolana(SOL)$86.290.74%
  • tronTRON(TRX)$0.3329941.30%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.030.36%
  • dogecoinDogecoin(DOGE)$0.094978-0.67%