sb-eu logo
Story image

Monero cryptocurrency miner enslaves Windows Server 2003 systems in botnet

02 Oct 2017

A malicious cryptocurrency miner is causing havoc in Windows web servers worldwide and those with unpatched systems are vulnerable to becoming part of a mining botnet.

ESET researchers report that the miner leverages a known vulnerability in Microsoft IIS 6.0 to covertly install the Monero cryptocurrency miner on unpatched servers.

Monero is an alternative cryptocurrency to Bitcoin. Since May 2017, cybercriminals have modified legitimate open source Monero mining software and installed it on the servers.

They then used it to create a botnet containing several hundred servers and mined more than AU$80,000 of Monero cryptocurrency.

While Microsoft has addressed the vulnerability CVE-2017-7269 in server updates, researchers say many servers remain outdated.

“As a significant number of systems are still vulnerable, users of Windows Server 2003 are strongly advised to apply the security update, KB3197835, and other critical patches as soon as possible,” comments Michal Poslušný, ESET malware analyst.

“It is a vulnerability in the WebDAV service that is part of Microsoft IIS version 6.0, the webserver in Windows Server 2003 R2,” researchers explain.

In 2015, Microsoft ended regular update support for Windows Server 2003, however it did release a patch for this vulnerability in June 2017. This was only after several malware authors spotted several critical vulnerabilities in its older systems, researchers explain.

However, automatic updated don’t always work and this impacts the ability to keep Windows Server 2003 up to date.

“If automatic updates fail, we encourage users to download and install the security update manually to avoid falling victim to malicious attacks,” Poslušný continues.

The miner is also an example of how minimal skill levels and low operating costs can create functioning malware – in this instance, it was a combination of genuine software manipulation and unpatched systems that created the perfect environment for the Monero miner.

Researcher Peter Kálnai says there are many reasons why Monero is an attractive cryptocurrency for mining purposes, even though Bitcoin is worth more in the market.

“Features such as untraceable transactions and a proof of work algorithm called CryptoNight, which favours computer or server central processing units, make the cryptocurrency an attractive alternative for cybercriminals. Bitcoin mining, in comparison, requires specialised mining hardware,” he explains.

While the attackers were active around the end of August, there has been no further activity from them and no further infections reported. Attackers have already started losing machines within their botnet.

Researchers believe a new campaign will be launched in the near future.

Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
BT Security shakes up roster of vendors after 'largest ever' partner review
BT says the decision to review their security partner base was driven by the recognition that many customers find it difficult to navigate today’s complex security landscape, as well as customers’ desire to have a ‘leaner set of partners’.More
Story image
How security awareness training can safeguard companies from cyber-attacks
Training goes a long way in embedding a culture of cybersecurity compliance within the company.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Lazarus Group linked to phishing attacks on cryptocurrency sector
In this case, the attacks were launched through a phishing document sent via LinkedIn to employees at the targeted organisation. This phishing document was styled to look like a job advertisement for a role in a blockchain company.More