follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel . ask urgent question ONLY . Subscribe to our reddit . Altcoins Talks Shop Shop


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open

Author Topic: New Monero Botnet Looks Like Last Year’s Outlaw Attack  (Read 2138 times)

Offline Mercury

  • Hero Member
  • *
  • Activity: 703
  • points:
    2635
  • Karma: 15
  • Trade Count: (0)
  • Referrals: 0
  • Last Active: May 23, 2023, 06:21:08 PM
    • View Profile

  • Total Badges: 17
    Badges: (View All)
    Fifth year Anniversary Fourth year Anniversary 10 Posts
New Monero Botnet Looks Like Last Year’s Outlaw Attack
« on: June 18, 2019, 01:35:33 PM »

There’s another Monero mining botnet that’s targeting China. Or maybe it’s one we’ve seen before.

Bloggers steeped in the hacker-verse recently exposed a URL spreading a botnet that looks suspiciously like one unleashed by the Outlaw hacking group last year. The Outlaw outfit — a name coined by its discoverers at Trend Micro, who translated “the Romanian word haiduc, the hacking tool the group primarily uses” — is infamous for its previous release of a Perl-based shellbot that infiltrates through weaknesses in the Internet of Things.

The new attack, uncovered by Trend Micro’s honeypot security systems, has been restricted to computers based in China so far. The malware is spread through a malicious URL which bundles in a Monero-mining script and a backdoor-based exploit.

Trend Micro estimates that hackers have used crypto-jacking to mine $250,000 per month in Monero.

The Outlaw botnet uses a brute force attack and Secure Shell (SSH) exploit to give the attackers remote access over victim’s systems. A more detailed report of Outlaw’s previous attack showed that once the attackers have access, the malware executes commands to download and install the cryptocurrency miner payload. Additionally, if the malware detects cryptocurrency miners already installed on the system, it will delete them to reduce competition for system resources.

The security experts also noted that the backdoor component is also capable of launching distributed denial-of-service attacks which would allow the cybercriminals to monetize their botnet not only through mining, but by offering DDoS-for-hire services.

However, because the scripts haven’t been activated, Trend Micro believes the hackers are still in the testing and development phase. They suggest the malware may be laying dormant until future editions of the botnet are released.

This comment lead TheNextWeb to speculate whether the botnet has mined any cryptocurrency or made any successful attacks yet.

Source

Altcoins Talks - Cryptocurrency Forum

New Monero Botnet Looks Like Last Year’s Outlaw Attack
« on: June 18, 2019, 01:35:33 PM »

This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open


 

ETH & ERC20 Tokens Donations: 0x2143F7146F0AadC0F9d85ea98F23273Da0e002Ab
BNB & BEP20 Tokens Donations: 0xcbDAB774B5659cB905d4db5487F9e2057b96147F
BTC Donations: bc1qjf99wr3dz9jn9fr43q28x0r50zeyxewcq8swng
BTC Tips for Moderators: 1Pz1S3d4Aiq7QE4m3MmuoUPEvKaAYbZRoG
Powered by SMFPacks Social Login Mod