Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
Researchers have published a new report on what they say is a ârelentlessâ crypto mining botnet that lurks behind seemingly innocuous content like JPEG images of Taylor Swift.
Researchers have published a new report on what they deem to be a ârelentlessâ crypto mining botnet that lurks behind seemingly innocuous content such as JPEG images of Taylor Swift.
The botnet â best known as MyKings (alternatively as DarkCloud or Smominru) â has been active since 2016, according to a Dec. 18 news release from Gabor Szappanos at SophosLabs.
While all âunderpatched, low-hanging fruitâ on the internet â to use Sophosâ phrasing â has long been vulnerable to its attacks, recently the actors behind MyKings have allegedly added bootkit functionality, which makes it all the more resistant to detection and effective removal.
$3M in Monero illicitly mined via MyKings to date
SophosLabsâ report provides a full overview of the botnetâs operations, which Szappanos characterizes as a ârelentlessly redundant [i.e. repetitive] attackerâ that attacks mostly Windows-based services that hosts database management systems such as MqSQL and MS-SQL, network protocols such as Telnet, and even servers running CCTV camera storage.
The report notes that the botnetâs creators appear to prefer to use open source or other public domain software and are highly skilled at customizing and enhancing source code to insert custom components that can execute attacks and perform automated update processes.
The botnet launches a series of attacks against a server with the aim of delivering a malware executable, frequently a Trojan dubbed âForshare,â which was found to be the most common payload on infected servers.Â
Forshare is used to ensure that various different Monero (XMR) cryptominers run on the targeted hardware, with SophosLabsâ estimating that the botnet operators have earned roughly $3 million in Monero to date. This translates into a current income of around $300 per day, due to the cryptocurrencyâs recently lower relative valuation.
Not what she seems
Source: SophosLabs Uncut Report
In the studied example â an imperceptibly modified image of the pop star Taylor Swift â SophosLabs explains that the .jpg photo had been uploaded to a public repository, concealing within it an executable that would automatically update the botnet when downloaded.
SophosLabsâ research reveals the sophisticated nature of MyKingsâ persistence mechanism, which perpetuates itself through aggressive repetition and self-updating procedures using multiple command combinations.Â
âEven if most of the components of the botnet are removed from the computer, the remaining ones have the capability to restore it to full strength simply by updating themselves. All of this is orchestrated using self-extracting RAR archives and Windows batch files.â
The report indicates that the countries with the highest number of infected hosts are currently China, Taiwan, Russia, Brazil, the United States, India and Japan.
Recent Monero crimes
In November, Cointelegraph reported that the software available for download on Moneroâs official website, getmonero.org, had been briefly compromised to steal cryptocurrency and drain usersâ wallets.
That same month, Slovakian software security firm Eset revealed that cybercriminals operating a botnet known as Stantinko had been distributing a Monero cryptocurrency mining module via Youtube.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.