Mining for Monero and evading detection | xxxMining for Monero and evading detection – xxx
菜单

Mining for Monero and evading detection

十一月 30, 2018 - BleepingComputer

Mining for Monero and evading detection

A recently discovered cryptomining operation forces access to Windows servers to use their CPU cycles for mining Monero coins. Detected six months ago, the activity went through multiple stages of evolution.

Since it was spotted in mid-June, the malware received two updates and the number of attacks keeps increasing.

Mining for Monero and evading detection

The researchers at CheckPoint analyzed the new threat and gave it the name KingMiner. They found that it targets Microsoft IIS and SQL Servers in particular and runs a brute-force attack to gain access. Once in, the malware determines the CPU architecture and checks for older versions of itself to remove them.

Mining for Monero and evading detection

It relies on the freely available XMRig miner to create Monero coins, with a configuration file that contains private mining pool with the API disabled to keep away from prying eyes.

The wallet address present in the file has not been used in public mining operations, which prevents researchers from checking its balance.

According to the researchers, the miner is configured to use 75% of the CPU resources but in practice, it uses 100% of the processor, probably because of bugs in the code.

Mining for Monero and evading detection

KingMiner implements several defenses against emulation environments and detection, recording low rates with some antivirus engines by using an XML payload disguised as a ZIP file.

“The use of evasion techniques is a major component of a successful attack,” CheckPoint says, adding that the malware uses simple techniques to bypass emulation and detection methods.

Over the course of three months, from June to October, KingMiner continued to improve by moving to an obfuscated payload and a modified configuration file for the miner.

Mining for Monero and evading detection

All these modifications led to a low detection rate on VirusTotal, with the last two versions of the malware being flagged as malicious by seven antivirus engines and less.

CheckPoint’s telemetry data indicates that KingMiner infections spread “from Mexico to India, and Norway to Israel.”

Mining for Monero and evading detection

KingMiner counts on simple methods to stay hidden from security products and was successful at it. The company predicts that cryptomining attacks will continue to evolve in 2019 and become better at evading detection.

Related Articles:

Windows Defender Can Detect Accessibility Tool Backdoors

Edge Browser Can Now Sign Into Microsoft Accounts With FIDO2 Security Keys

Make-A-Wish Website Compromised for Cryptojacking Operation

Misconfigured Docker Services Actively Exploited in Cryptojacking Operation

Microsoft Patches Windows Zero-Day Exploited in Cyber Attacks


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51