Windigo

The Windigo group has been operating since at least 2011, compromising thousands of Linux and Unix servers using the Ebury SSH backdoor to create a spam botnet. Despite law enforcement intervention against the creators, Windigo operators continued updating Ebury through 2019.[1][2]

ID: G0124
Version: 1.0
Created: 10 February 2021
Last Modified: 26 April 2021

Techniques Used

Domain ID Name Use
Enterprise T1005 从本地系统获取数据

Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.[3]

Enterprise T1090 代理

Windigo has delivered a generic Windows proxy Win32/Glubteta.M. Windigo has also used multiple reverse proxy chains as part of their C2 infrastructure.[1]

Enterprise T1059 命令与脚本解释器

Windigo has used a Perl script for information gathering.[3]

Enterprise T1083 文件和目录发现

Windigo has used a script to check for the presence of files created by OpenSSH backdoors.[3]

Enterprise T1189 浏览器攻击

Windigo has distributed Windows malware via drive-by downloads.[1]

Enterprise T1082 系统信息发现

Windigo has used a script to detect which Linux distribution and version is currently installed on the system.[3]

Enterprise T1518 软件发现

Windigo has used a script to detect installed software on targeted systems.[3]

Software

References