Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Scheduled Task/Job
  5. Cron

Scheduled Task/Job: Cron

Adversaries may abuse thecron utility to perform task scheduling for initial or recurring execution of malicious code.[1] Thecron utility is a time-based job scheduler for Unix-like operating systems. The crontab file contains the schedule of cron entries to be run and the specified times for execution. Anycrontab files are stored in operating system-specific file paths.

An adversary may usecron in Linux or Unix environments to execute programs at system startup or on a scheduled basis forPersistence. In ESXi environments, cron jobs must be created directly via the crontab file (e.g.,/var/spool/cron/crontabs/root).[2]

ID: T1053.003
Sub-technique of: T1053
Platforms: ESXi, Linux, macOS
Version: 1.3
Created: 03 December 2019
Last Modified: 24 October 2025

Procedure Examples

IDNameDescription
S0504 Anchor

Anchor can install itself as a cron job.[3]

G0082 APT38

APT38 has used cron to create pre-scheduled and periodic background jobs on a Linux system.[4]

G1023 APT5

APT5 has made modifications to the crontab file including in/var/cron/tabs/.[5]

S0401 Exaramel for Linux

Exaramel for Linux uses crontab for persistence if it does not have root privileges.[6][7]

S0588 GoldMax

TheGoldMax Linux variant has used a crontab entry with a@reboot line to gain persistence.[8]

S1198 Gomir

Gomir will configure a crontab for process execution to start the backdoor on reboot if it is not initially running under group 0 privileges.[9]

S0163 Janicab

Janicab used a cron job for persistence on Mac devices.[10]

S0599 Kinsing

Kinsing has used crontab to download and run shell scripts every minute to ensure persistence.[11]

S0198 NETWIRE

NETWIRE can use crontabs to establish persistence.[12]

S1107 NKAbuse

NKAbuse uses a Cron job to establish persistence when infecting Linux hosts.[13]

C0048 Operation MidnightEclipse

DuringOperation MidnightEclipse, threat actors configured cron jobs to retrieve payloads from actor-controlled infrastructure.[14][15]

S0587 Penquin

Penquin can use Cron to create periodic and pre-scheduled background jobs.[16]

G0106 Rocke

Rocke installed a cron job that downloaded and executed files from the C2.[17][18][19]

S0468 Skidmap

Skidmap has installed itself via crontab.[20]

S0374 SpeakUp

SpeakUp uses cron tasks to ensure persistence.[21]

S0341 Xbash

Xbash can create a cronjob for persistence if it determines it is on a Linux system.[22]

Mitigations

IDMitigationDescription
M1047 Audit

Review changes to thecron schedule.cron execution can be reviewed within the/var/log directory. To validate the location of thecron log file, check the syslog config at/etc/rsyslog.conf or/etc/syslog.conf.

M1018 User Account Management

cron permissions are controlled by/etc/cron.allow and /etc/cron.deny. If there is acron.allow file, then the user or users that need to usecron will need to be listed in the file.cron.deny is used to explicitly disallow users from using cron. If neither files exist, then only the super user is allowed to run cron.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0290Cross-Platform Detection of Cron Job Abuse for Persistence and ExecutionAN0805

Detects creation or modification of crontab entries by non-root users or from abnormal parent processes, followed by the execution of uncommon binaries at scheduled intervals.

AN0806

Detects crontab job additions or modifications viacrontab utility or direct edits, especially those created by interactive users executing hidden or renamed scripts.

AN0807

Detects direct modification of crontab entries in /var/spool/cron/crontabs/root or /etc/rc.local.d/local.sh followed by execution of scripts linked to lateral movement or malware persistence.

References

  1. Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.
  2. Mehardeep Singh Sawhney. (2023, February 9). Analysis of Files Used in ESXiArgs Ransomware Attack Against VMware ESXi Servers. Retrieved March 26, 2025.
  3. Grange, W. (2020, July 13). Anchor_dns malware goes cross platform. Retrieved September 10, 2020.
  4. DHS/CISA. (2020, August 26). FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks. Retrieved September 29, 2021.
  5. National Security Agency. (2022, December). APT5: Citrix ADC Threat Hunting Guidance. Retrieved February 5, 2024.
  6. Cherepanov, A., Lipovsky, R. (2018, October 11). New TeleBots backdoor: First evidence linking Industroyer to NotPetya. Retrieved November 27, 2018.
  7. ANSSI. (2021, January 27). SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS. Retrieved March 30, 2021.
  8. CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.
  9. Symantec Threat Hunter Team. (2024, May 16). Springtail: New Linux Backdoor Added to Toolkit. Retrieved January 17, 2025.
  10. Thomas. (2013, July 15). New signed malware called Janicab. Retrieved July 17, 2017.
  11. Singer, G. (2020, April 3). Threat Alert: Kinsing Malware Attacks Targeting Container Environments. Retrieved April 1, 2021.
  1. Lambert, T. (2020, January 29). Intro to Netwire. Retrieved January 7, 2021.
  2. KASPERSKY GERT. (2023, December 14). Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol. Retrieved February 8, 2024.
  3. Volexity Threat Research. (2024, April 12). Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400). Retrieved November 20, 2024.
  4. Unit 42. (2024, April 12). Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 . Retrieved January 15, 2025.
  5. Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64”. Retrieved March 11, 2021.
  6. Liebenberg, D.. (2018, August 30). Rocke: The Champion of Monero Miners. Retrieved May 26, 2020.
  7. Xingyu, J.. (2019, January 17). Malware Used by Rocke Group Evolves to Evade Detection by Cloud Security Products. Retrieved May 26, 2020.
  8. Anomali Labs. (2019, March 15). Rocke Evolves Its Arsenal With a New Malware Family Written in Golang. Retrieved April 24, 2019.
  9. Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020.
  10. Check Point Research. (2019, February 4). SpeakUp: A New Undetected Backdoor Linux Trojan. Retrieved April 17, 2019.
  11. Xiao, C. (2018, September 17). Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows. Retrieved November 14, 2018.
×

[8]ページ先頭

©2009-2026 Movatter.jp