Windigo

The Windigo group has been operating since at least 2011, compromising thousands of Linux and Unix servers using the Ebury SSH backdoor to create a spam botnet. Despite law enforcement intervention against the creators, Windigo operators continued updating Ebury through 2019.[1][2]

ID: G0124
Version: 1.0
Created: 10 February 2021
Last Modified: 26 April 2021

Techniques Used

Domain ID Name Use
Enterprise T1059 Command and Scripting Interpreter

Windigo has used a Perl script for information gathering.[3]

Enterprise T1005 Data from Local System

Windigo has used a script to gather credentials in files left on disk by OpenSSH backdoors.[3]

Enterprise T1189 Drive-by Compromise

Windigo has distributed Windows malware via drive-by downloads.[1]

Enterprise T1083 File and Directory Discovery

Windigo has used a script to check for the presence of files created by OpenSSH backdoors.[3]

Enterprise T1090 Proxy

Windigo has delivered a generic Windows proxy Win32/Glubteta.M. Windigo has also used multiple reverse proxy chains as part of their C2 infrastructure.[1]

Enterprise T1518 Software Discovery

Windigo has used a script to detect installed software on targeted systems.[3]

Enterprise T1082 System Information Discovery

Windigo has used a script to detect which Linux distribution and version is currently installed on the system.[3]

Software

ID Name References Techniques
S0377 Ebury [4] Application Layer Protocol: DNS, Automated Exfiltration, Command and Scripting Interpreter: Python, Compromise Client Software Binary, Data Encoding: Standard Encoding, Deobfuscate/Decode Files or Information, Dynamic Resolution: Domain Generation Algorithms, Encrypted Channel: Symmetric Cryptography, Exfiltration Over C2 Channel, Fallback Channels, File and Directory Discovery, Hijack Execution Flow: Dynamic Linker Hijacking, Impair Defenses: Indicator Blocking, Impair Defenses: Disable or Modify Tools, Modify Authentication Process, Modify Authentication Process: Pluggable Authentication Modules, Obfuscated Files or Information, Rootkit, Subvert Trust Controls: Code Signing, Unsecured Credentials: Private Keys

References