Story image

Monero cryptocurrency miner enslaves Windows Server 2003 systems in botnet

02 Oct 2017

A malicious cryptocurrency miner is causing havoc in Windows web servers worldwide and those with unpatched systems are vulnerable to becoming part of a mining botnet.

ESET researchers report that the miner leverages a known vulnerability in Microsoft IIS 6.0 to covertly install the Monero cryptocurrency miner on unpatched servers.

Monero is an alternative cryptocurrency to Bitcoin. Since May 2017, cybercriminals have modified legitimate open source Monero mining software and installed it on the servers.

They then used it to create a botnet containing several hundred servers and mined more than AU$80,000 of Monero cryptocurrency.

While Microsoft has addressed the vulnerability CVE-2017-7269 in server updates, researchers say many servers remain outdated.

“As a significant number of systems are still vulnerable, users of Windows Server 2003 are strongly advised to apply the security update, KB3197835, and other critical patches as soon as possible,” comments Michal Poslušný, ESET malware analyst.

“It is a vulnerability in the WebDAV service that is part of Microsoft IIS version 6.0, the webserver in Windows Server 2003 R2,” researchers explain.

In 2015, Microsoft ended regular update support for Windows Server 2003, however it did release a patch for this vulnerability in June 2017. This was only after several malware authors spotted several critical vulnerabilities in its older systems, researchers explain.

However, automatic updated don’t always work and this impacts the ability to keep Windows Server 2003 up to date.

“If automatic updates fail, we encourage users to download and install the security update manually to avoid falling victim to malicious attacks,” Poslušný continues.

The miner is also an example of how minimal skill levels and low operating costs can create functioning malware – in this instance, it was a combination of genuine software manipulation and unpatched systems that created the perfect environment for the Monero miner.

Researcher Peter Kálnai says there are many reasons why Monero is an attractive cryptocurrency for mining purposes, even though Bitcoin is worth more in the market.

“Features such as untraceable transactions and a proof of work algorithm called CryptoNight, which favours computer or server central processing units, make the cryptocurrency an attractive alternative for cybercriminals. Bitcoin mining, in comparison, requires specialised mining hardware,” he explains.

While the attackers were active around the end of August, there has been no further activity from them and no further infections reported. Attackers have already started losing machines within their botnet.

Researchers believe a new campaign will be launched in the near future.

Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Norwegian aluminium manufacturer hit hard by LockerGoga ransomware attack
“IT systems in most business areas are impacted and Hydro is switching to manual operations as far as possible.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.