Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments

Posted on August 12, 2025August 12, 2025 By CWS

A major vulnerability in multi-user Linux environments, the place normal system behaviors could be exploited to reap delicate credentials and secrets and techniques from different customers. 

The analysis, introduced in “Silent Leaks: Harvesting Secrets and techniques from Shared Linux Environments,” demonstrates how authentic system instruments grow to be weapons for reconnaissance in shared internet hosting environments.

The assault methodology leverages elementary Linux transparency options that had been initially designed for trusted multi-user environments like universities and shared laboratories. 

Key Takeaways1. ps auxww and /proc/[pid]/cmdline expose reside passwords and API keys from different customers’ processes.2. CageFS, chroot, and LiteSpeed could be bypassed by way of internet hosting panel binaries and shared logs.3. /tmp listing surveillance captures delicate recordsdata containing credentials and secrets and techniques.

These programs prioritize debugging capabilities and system monitoring over strict inter-user isolation, creating alternatives for malicious actors to assemble intelligence with out triggering conventional safety alerts.

Course of Info Exploitation 

The first assault vector exploits the default visibility of course of arguments by means of instructions like ps auxww and accessing /proc/[pid]/cmdline. 

Ionut Cernica’s analysis exhibits how attackers can constantly monitor these course of lists to seize real-time credential exposures.

Actual-world examples from the analysis embody database credentials leaked by means of WordPress CLI operations:

System administration instructions additionally expose delicate data throughout person creation and database operations:

The researcher documented instances the place administrative passwords, API keys, and database credentials had been seen to any person able to executing fundamental course of monitoring instructions. 

This consists of situations the place root-level operations inadvertently expose credentials by means of command-line arguments.

Bypass Isolation Methods and Exploiting Non permanent Information

Even in environments protected by isolation programs like CageFS and chroot jails, Cernica efficiently demonstrated escape strategies. 

One notable case concerned exploiting a internet hosting panel binary that inadvertently ran exterior the CageFS surroundings, offering entry to the actual host system.

Attacker Objectives

The analysis additionally highlighted vulnerabilities in LiteSpeed net server configurations the place accessing /proc/self/fd/2 allowed attackers to learn shared stderr.log recordsdata, exposing real-time error output from different customers’ scripts. 

This included PayPal API tokens and session cookies:

Non permanent file monitoring presents one other vital menace vector. Scripts that monitor /tmp directories can seize delicate recordsdata together with SQL dumps, configuration recordsdata, and set up logs containing administrative passwords. 

The researcher documented instances the place set up logs uncovered vital system credentials:

The implications prolong past conventional internet hosting suppliers to growth servers, instructional laboratories, VPS environments, and CTF infrastructure. 

Cernica responsibly disclosed these vulnerabilities to main internet hosting platforms in April, with fixes at the moment in progress throughout affected programs.

Equip your SOC with full entry to the most recent menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Behaviours, Environments, Harvest, Legitimate, Linux, Secrets, Shared, System, Weaponized

Post navigation

Previous Post: Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US
Next Post: Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands

Related Posts

Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Cyber Security News
ClickFix Malware Attacks macOS Users to Steal Login Credentials Cyber Security News
Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365 Cyber Security News
Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools Cyber Security News
Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions Cyber Security News
APT Hackers Attacking Maritime and Shipping Industry to Launch Ransomware Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability
  • Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability
  • Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News