Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments

Posted on August 12, 2025August 12, 2025 By CWS

A major vulnerability in multi-user Linux environments, the place normal system behaviors could be exploited to reap delicate credentials and secrets and techniques from different customers. 

The analysis, introduced in “Silent Leaks: Harvesting Secrets and techniques from Shared Linux Environments,” demonstrates how authentic system instruments grow to be weapons for reconnaissance in shared internet hosting environments.

The assault methodology leverages elementary Linux transparency options that had been initially designed for trusted multi-user environments like universities and shared laboratories. 

Key Takeaways1. ps auxww and /proc/[pid]/cmdline expose reside passwords and API keys from different customers’ processes.2. CageFS, chroot, and LiteSpeed could be bypassed by way of internet hosting panel binaries and shared logs.3. /tmp listing surveillance captures delicate recordsdata containing credentials and secrets and techniques.

These programs prioritize debugging capabilities and system monitoring over strict inter-user isolation, creating alternatives for malicious actors to assemble intelligence with out triggering conventional safety alerts.

Course of Info Exploitation 

The first assault vector exploits the default visibility of course of arguments by means of instructions like ps auxww and accessing /proc/[pid]/cmdline. 

Ionut Cernica’s analysis exhibits how attackers can constantly monitor these course of lists to seize real-time credential exposures.

Actual-world examples from the analysis embody database credentials leaked by means of WordPress CLI operations:

System administration instructions additionally expose delicate data throughout person creation and database operations:

The researcher documented instances the place administrative passwords, API keys, and database credentials had been seen to any person able to executing fundamental course of monitoring instructions. 

This consists of situations the place root-level operations inadvertently expose credentials by means of command-line arguments.

Bypass Isolation Methods and Exploiting Non permanent Information

Even in environments protected by isolation programs like CageFS and chroot jails, Cernica efficiently demonstrated escape strategies. 

One notable case concerned exploiting a internet hosting panel binary that inadvertently ran exterior the CageFS surroundings, offering entry to the actual host system.

Attacker Objectives

The analysis additionally highlighted vulnerabilities in LiteSpeed net server configurations the place accessing /proc/self/fd/2 allowed attackers to learn shared stderr.log recordsdata, exposing real-time error output from different customers’ scripts. 

This included PayPal API tokens and session cookies:

Non permanent file monitoring presents one other vital menace vector. Scripts that monitor /tmp directories can seize delicate recordsdata together with SQL dumps, configuration recordsdata, and set up logs containing administrative passwords. 

The researcher documented instances the place set up logs uncovered vital system credentials:

The implications prolong past conventional internet hosting suppliers to growth servers, instructional laboratories, VPS environments, and CTF infrastructure. 

Cernica responsibly disclosed these vulnerabilities to main internet hosting platforms in April, with fixes at the moment in progress throughout affected programs.

Equip your SOC with full entry to the most recent menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Behaviours, Environments, Harvest, Legitimate, Linux, Secrets, Shared, System, Weaponized

Post navigation

Previous Post: Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US
Next Post: Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands

Related Posts

U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity Cyber Security News
Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack Cyber Security News
Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Cyber Security News
New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack Cyber Security News
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News
Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles
  • Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands
  • Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments
  • Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles
  • Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands
  • Linux Legitimate System Behaviours Weaponized to Harvest Secrets from Shared Environments
  • Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News