Diabolical Malware Targets Home windows Customers to Mine Monero

HomeCrypto News

Diabolical Malware Targets Home windows Customers to Mine Monero

On June 24, safety consultants from Palo Alto Networks’ Unit 42 warned a few new self-propagating malware that launches cryptojacking and DDoS assa



On June 24, safety consultants from Palo Alto Networks’ Unit 42 warned a few new self-propagating malware that launches cryptojacking and DDoS assaults in opposition to Home windows programs. The software program operates underneath the identify “Lucifer”.

In keeping with the examine, Lucifer is a hybrid of cryptojacking and DDoS malware that leverages outdated vulnerabilities on the Home windows platform.

Vulnerabilities exploited

After breaking the safety infrastructure, attackers execute instructions that launch DDoS assaults. This enables them to put in XMRig Miner, a well known Monero (XMR) mining app, to launch cryptojacking assaults.

Palo Alto Networks claims {that a} associated Monero pockets has obtained 0.493527 XMR to date. That converts to roughly $32 as of press time.

Stopping this “diabolical” assault

The researches behind the examine supplied some suggestions to keep away from Lucifer’s malware:

“Making use of the updates and patches to the affected software program are strongly suggested. The weak software program consists of Rejetto HTTP File Server, Jenkins, Oracle Weblogic, Drupal, Apache Struts, Laravel framework, and Microsoft Home windows. Sturdy passwords are additionally inspired to forestall dictionary assaults.”

Latest reviews revealed {that a} group of hackers behind the Kingminer botnet focused weak Microsoft SQL server databases to mine Monero in some unspecified time in the future within the second week of June.

Cointelegraph lately reported on an assault which hijacks machine studying clusters on Microsoft’s Azure cloud computing community to mine Monero.



cointelegraph.com