Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » The 10-year-old Romanian hacker group “RUBYCARP” surfaced through a botnet
    Cyber Security

    The 10-year-old Romanian hacker group “RUBYCARP” surfaced through a botnet

    techempireBy techempire4 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 9, 2024Editorial DepartmentBotnet/Cryptocurrency Mining

    Romanian hacker group

    A suspected threat group from Romania named ruby The botnet was observed to be long-running and used to conduct cryptocurrency mining, decentralized denial of service (DDoS), and phishing attacks.

    In a report shared with The Hacker News, Sysdig said the group is believed to have been active for at least 10 years, using botnets for financial gain.

    “The primary method of operation is to exploit botnets deployed using various public vulnerabilities and brute force attacks,” the cloud security company said. “The group communicates via public and private IRC networks.”

    Evidence collected so far suggests that RUBYCARP may intersect with another threat cluster called Outlaw tracked by Albanian cybersecurity firm Alphatechs, which has a history of conducting cryptocurrency mining and brute force attacks before turning to phishing and phishing Fork phishing campaigns cast a wide net.

    Internet security

    “These phishing emails often lure victims into revealing sensitive information, such as login credentials or financial details,” security researcher Brenton Isufi said in a report published in late December 2023.

    One notable aspect of the RUBYCARP trading technique is the use of malware called ShellBot (also known as PerlBot) to compromise the target environment. It has also been observed exploiting security vulnerabilities in the Laravel framework (such as CVE-2021-3129), a technique also used by other threat actors such as AndroxGh0st.

    Romanian hacker group

    Sysdig said it found signs of WordPress sites being compromised using common usernames and passwords, suggesting attackers are expanding their arsenal of initial access methods to increase the size of the botnet.

    “Once access is gained, a backdoor based on the popular Perl ShellBot is installed,” the company said. “The victim’s server then connects to [Internet Relay Chat] The server acts as a command and control role and joins the larger botnet. “

    The botnet is estimated to consist of more than 600 hosts, including an IRC server (“chat.juicessh[.]pro”) was created on May 1, 2023. It relies heavily on IRC for general communications as well as managing its botnet and coordinating cryptocurrency mining activities.

    In addition, members of the group (named Juice_, Eugen, Catalin, MUIE, and Smecher, among others) were spotted communicating through an Undernet IRC channel called #cristi. Mass scanner tools are also used to find new potential hosts.

    Internet security

    RUBYCARP’s emergence in the cyber threat landscape is not surprising given their ability to leverage botnets to drive a variety of illicit revenue streams, such as cryptocurrency mining and phishing operations to steal credit card numbers.

    While stolen credit card information appears to have been used to purchase attack infrastructure, it is also possible that the information is monetized in other ways by being sold in the cybercriminal underground.

    “It’s not uncommon for these threat actors to also be involved in the development and sale of cyber weapons,” Sistig said. “They have a vast array of tools that they have accumulated over the years, which gives them considerable flexibility in how they conduct their operations. sex.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.