Update your equipment: a new botnet looks for vulnerabilities to mine cryptocurrencies

 


On many occasions, hackers take advantage of security flaws in computers to carry out their attacks. This is what happens with the new botnet that seeks to mine cryptocurrencies on both Windows and Linux systems. It scans for vulnerabilities to achieve its goal. It's about Sysrv-hello and it was discovered by Alibaba Cloud.

Sysrv-hello, a botnet that looks for vulnerabilities in Windows or Linux

The hidden criptomonedas mining is a problem to be taken  fashionbeautypalace  into account because it can lead to the end our team and affect not only performance but also hardware components. It is a type of threat that has increased considerably in recent years due to the rise of digital currencies.

After all, hackers are looking for a way to profit. They  create new attack techniques , look for flaws that can exploit and ultimately infect victims' computers. With Sysrv-hello they manage to sneak a botnet to mine cryptocurrencies on both Windows and Linux. Specifically, it is in charge of mining Monero, one of the most popular cryptocurrencies.

This botnet was discovered for the first time in February,  but it has been active since December 2020. It was in March that it had a significant increase in activity. Currently it has been updated to be able to use a single binary capable of automatically extracting and sneaking malware onto other devices.

How does Sysrv-hello work? Basically what it does is scan the Internet for vulnerable computers. This way it could infect those systems and introduce its army of botnets and start mining Monero .

According to security researchers, they are based on vulnerabilities found in remote code execution in PHPUnit, Apache Solar, Confluence, Laravel, JBoss, Jira, Sonatype, Oracle WebLogic, and Apache Struts.

It should be taken into account that once it has managed to hack the server, this malware is capable of spreading through the network through brute force attacks using SSH private keys that it collects from infected servers.

There have been mainly six exploited vulnerabilities, which are as follows:

  • Mongo Express RCE (CVE-2019-10758)
  • XML-RPC (CVE-2017-11610)
  • Saltstack RCE (CVE-2020-16846)
  • Drupal Ajax RCE (CVE-2018-7600)
  • ThinkPHP RCE (without CVE)
  • XXL-JOB Unauth RCE (without CVE)

How to protect ourselves from cryptocurrency mining

We have seen how this new botnet is capable of infecting Windows or Linux systems to carry out its attacks and mine cryptocurrencies. However, we can run into similar threats that our team can take advantage of to achieve their goal. Avoiding botnet attacks is something that we must bear in mind.

Undoubtedly the most important thing to avoid being victims of this problem is to have updated equipment . We have seen that in this case you need vulnerable systems, without updating. Therefore, the main advice is to always keep the equipment updated. It does not matter what operating system we are using.

It is also going to be important to have security programs . A good antivirus can help avoid many varieties of malicious software that could compromise us in one way or another. It is essential to apply this no matter what operating system we are using.

But another fundamental issue is common sense . We must avoid making mistakes that can be exploited by hackers and put our computers at risk. For example, it would be a mistake to download programs from third-party sites without verifying whether they are legitimate, download attachments that may be dangerous, or log into an insecure network.