Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Latest Mirai-based botnet targets SSH servers for cryptocurrency mining
    Cyber Security

    Latest Mirai-based botnet targets SSH servers for cryptocurrency mining

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 10, 2024Editorial DepartmentServer Security/Encryption

    Mirai-based botnet

    A new Mirai-based botnet called Noah Robot Threat actors have been using it as part of cryptocurrency mining campaigns since early 2023.

    Akamai security researcher Stiv Kupchik said in a report shared with The Hacker News: “The capabilities of the new botnet NoaBot include a wormable self-propagating program and an SSH key backdoor that is used to download and execute other binaries or convert itself. spread to new victims.”

    Mirai, whose source code was leaked in 2016, is the ancestor of many botnets, the most recent of which is InfectedSlurs, which is capable of launching distributed denial-of-service (DDoS) attacks.

    There are indications that NoaBot may be related to another botnet campaign involving the Rust-based malware family P2PInfect, which recently received an update targeting routers and IoT devices.

    Internet security

    This is based on the fact that threat actors also attempted to use P2PInfect as a replacement for NoaBot in recent attacks against SSH servers, suggesting a possible move toward custom malware.

    Although NaoBot has a Mirai base, its extender module utilizes an SSH scanner to search for servers vulnerable to dictionary attacks in order to brute force them, and adds SSH public keys in the .ssh/authorized_keys file for remote storage. Pick. Alternatively, it could also download and execute additional binaries or spread itself to new victims after a successful exploit.

    Mirai-based botnet

    “NoaBot is compiled with uClibc, which seems to change the way antivirus engines detect malware,” Kupchik noted. “While other Mirai variants are typically detected via Mirai signatures, NoaBot’s antivirus signature is an SSH scanner or a general-purpose Trojan.”

    In addition to employing obfuscation tactics to make analysis challenging, the attack chain ultimately led to the deployment of a modified version of the XMRig coin miner.

    What makes this new variant superior to other similar Mirai botnet-based campaigns is that it does not contain any information about mining pools or wallet addresses, making it impossible to assess the profitability of illegal cryptocurrency mining schemes.

    Internet security

    “Miners obfuscate their configurations and use custom mining pools to avoid exposing the wallet addresses used by miners,” Kupchik said, emphasizing a certain level of preparedness on the part of threat actors.

    Akamai said it has identified 849 victim IP addresses so far, which are distributed around the world, with China reporting a high concentration, accounting for almost 10% of all attacks against its honeypots in 2023.

    “The malware’s method of lateral movement is through a plain old SSH credential dictionary attack,” Kupchik said. “Restricting any network SSH access to your network can greatly reduce the risk of infection. In addition, using strong passwords (not default or randomly generated) passwords can also make your network more secure because malware can be used to guess A basic list of passwords.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.