Bitcoin market value fluctuations stimulate mining Trojan activity. Tencent Security releases 2019 mining Trojan report

Bitcoin market value fluctuations stimulate mining Trojan activity. Tencent Security releases 2019 mining Trojan report

Table of contents

1. Background

2. Currency Price Curve and Major Security Incidents
2.1WannaCry
2.2 The first rise
2.3 Fluctuation and decline
2.4 The second rise

3. 2019 Mining Trojan Infection Trends
3.1 Sample yield
3.2 Regional Distribution
3.3 Industry Distribution
3.4 Active Family
3.5 Main invasion methods

4. Technical characteristics of the 2019 mining trojan
4.1 Propagation characteristics
4.2 Malicious Code Execution
4.3 Persistent Attack

5. Mining Trojan Defense and Disposal Suggestions
5.1 Defense Plan
5.2 Disposal suggestions

6. Future Trends of Mining Trojans
6.1 “EternalBlue” vulnerability
6.2 BlueKeep Vulnerability
6.3 Botnet

Reference Links

1. Background


In August 2019, the state issued an opinion on supporting Shenzhen in building a pilot demonstration zone of socialism with Chinese characteristics, which mentioned that it supports the development of digital currency research and innovative applications such as mobile payments in Shenzhen. Industry insiders believe that conducting digital currency research will play a positive role in the digital economy.
Bitcoin was born in 2009, and it has been ten years since then. Monero, which was created in 2014, has also reached its fifth year. Digital cryptocurrencies represented by Bitcoin and Monero have gradually become known to the public in recent years, and many people use digital currency trading to earn profits.
With the booming development of the digital economy, the security issues of digital assets have also continued to emerge. According to the basic principles of digital currency: it does not rely on the issuance of specific monetary institutions, is based on specific algorithms, and is generated through a large amount of calculations, making "mining" the most basic way to obtain digital cryptocurrency. The only way to obtain more coins through "mining" is to increase computing power, so a large amount of money needs to be invested in purchasing computing equipment.
Hackers always want to get a lot of returns without investing money, so the idea of ​​"controlling other people's computers to mine" comes naturally, which is the concept of "mining Trojan". The earliest appearance time of "mining Trojan" is currently uncertain, but it began to become popular on a large scale in early 2017.
After hackers invade and control a large number of computers and implant mining programs, they use the computer's CPU or GPU resources to complete a large number of calculations, thereby obtaining digital cryptocurrencies. At the same time, most of the illegal data or digital weapons sold on the dark web use Bitcoin as a transaction currency, causing digital cryptocurrencies to become the circulation medium of the black and gray industries, and also giving rise to the continued prosperity of the mining industry. Since its outbreak in 2017, mining Trojans have gradually become one of the main threats in the cyber world.

Mining process CPU usage


This report first introduces the major security incidents that occurred during the period with the Bitcoin price change curve as the timeline, then summarizes the overall trend and technical characteristics of mining Trojans in 2019, and provides general and targeted defense and disposal suggestions. Finally, it predicts the future trend of mining Trojans.

2. Currency Price Curve and Major Security Incidents

Bitcoin price and security incidents


By observing the Bitcoin price curve and major security incidents from 2017 to 2019, we can find that during this period, "the price of the currency fluctuated sharply at a high level, and security incidents emerged in an endless stream." Some of the more influential attacks are as follows:

2.1 WannaCry

On May 12, 2017, the WannaCry worm broke out globally through the MS17-010 vulnerability, infecting a large number of corporate computers. After infecting the computer, the worm implanted a blackmail virus into the computer, causing a large number of computer files to be encrypted, and then demanded Bitcoin from the victim as a ransom for restoring the files.

2.2 The first rise

In the six months after the WannaCry worm outbreak (from May 2017 to December 2017), the price of Bitcoin experienced explosive growth, rising from $1,000/BTC to $17,000/BTC.
For a period of time after WannaCry, no other ransomware used the "Eternal Blue" vulnerability to spread on a large scale, but mining Trojans saw a "business opportunity" in it. In the second half of 2017, mining Trojans that used "Eternal Blue" to attack began to appear one after another. The first to be discovered was the large botnet MyKings.
2.2.1 MyKings
The Mykings botnet is one of the most complex botnets discovered so far. Its main attack features are to exploit the "EternalBlue" vulnerability and crack passwords for services such as MsSQL, RDP, and Telnet, then implant mining modules and remote control modules into the compromised hosts, and use scanning attack modules to spread in a worm-like manner.
After April 2017, the spread of MyKings began to explode, which was caused by its use of the "EternalBlue" vulnerability weapon attack. By installing Monero mining machines in the botnet and using server resources to mine, MyKings' Monero wallet has earned more than one million RMB.
2.2.2 ZombieBoy
In December 2017, Tencent Yujian Threat Intelligence Center detected a mining Trojan. The plaintext string "C:\Users\ZombieBoy\Documents\Visual Studio 2017\Projects\nc\Release\nc.pdb" was found in its PDB file. We searched online with the keyword "ZombieBoy" and found a "Eternal Blue" vulnerability exploit tool. We speculated that hackers modified this tool to spread mining Trojans. We named it ZombieBoyMiner based on its characteristics. Yujian backend statistics show that the Trojan infected more than 70,000 computers at its peak.

Vulnerability Exploitation Tool ZombieBoy

2.3 Fluctuation and decline

When ZombieBoyMiner appeared (December 2017), the price of Bitcoin was at its peak, and then it began to fluctuate and fall. Then, in March 2018, another mining worm WannaMiner was discovered that used the "EternalBlue" vulnerability to launch large-scale attacks.
2.3.1 WannaMiner
The WannaMiner Trojan builds infected machines into a robust botnet and supports self-updates on the intranet. Its ultimate goal is to make profits through mining. Since it attacks the kernel via SMB during its intranet propagation, it may cause a large number of machines on the enterprise intranet to experience blue screens. According to statistics, the WannaMiner mining worm has infected more than 30,000 machines.
WannaMiner’s attack process is as follows:

WannaMiner attack process


2.3.2 BuleHero
In August 2018, the mining worm BuleHero, which has the “strongest vulnerability attack”, appeared. According to the continuous tracking results of the Yujian Threat Intelligence Center, in addition to the “EternalBlue” vulnerability, BuleHero used the following vulnerabilities to attack:
LNK vulnerability CVE-2017-8464
Tomcat Arbitrary File Upload Vulnerability CVE-2017-12615
Apache Struts2 Remote Code Execution Vulnerability CVE-2017-5638
WebLogic Deserialization Arbitrary Code Execution Vulnerabilities CVE-2018-2628, CVE-2019-2725
Drupal Remote Code Execution Vulnerability CVE-2018-7600
Apache Solr Remote Code Execution Vulnerability CVE-2019-0193
THinkphpV5 vulnerability CNDV-2018-24942
In addition to the above vulnerabilities, the latest version of BuleHero also uses the vulnerability in the php_xmlrpc.dll module disclosed in the "PHPStudy" backdoor incident announced by the Hangzhou police in Zhejiang Province on September 20, 2019.

"PHPStudy" backdoor exploit


2.3.3 DTLMiner
In December 2018, the DTLMiner (Eternal Blue Downloader) mining Trojan broke out. Hackers hacked into a company's server and modified the upgrade configuration file of a certain software, causing users who installed the software to download the Trojan file during the upgrade. After the Trojan was running, it used the "Eternal Blue" vulnerability to spread rapidly in the intranet, resulting in 100,000 users being attacked in just two hours.
After DTLMiner built a botnet, it implanted a Monero mining program in the infected machines to mine. Since DTLMiner infected a large number of machines in a short period of time in the early stage, and continued to update, adding attack methods such as MsSQL blasting, IPC$ blasting, RDP blasting and Lnk vulnerability exploitation, it has remained active in 2019.

Upgrade component vulnerability exploited attack statement


2.3.4 “Invisibility”
After DTLMiner, the "Hidden Shadow" mining trojan appeared in early March 2019. This trojan makes extensive use of functional network disks and image storage to hide itself, and carries the NSA arsenal to have the ability to spread horizontally in the local area network. The large number of public services used by "Hidden Shadow" are as follows:

Public services used by “invisible people”

2.4 The second rise

At the same time as the "Hidden Shadow" mining trojan appeared, the price of Bitcoin resumed its rise. From March 2019 to June 2019, the price of Bitcoin rose from $4,000/BTC to $12,000/BTC.


sodinokibi

In June 2019, when the price of Bitcoin rebounded to a high point again, the sodinokibi ransomware broke out. The ransomware first appeared at the end of April 2019. In the early days, it used web service-related vulnerabilities to spread, which was similar to the famous GandCrab ransomware. At this time, GandCrab had announced that it would cease operations, and sodinokibi almost completely inherited GandCrab's transmission channels.
Around June, the Sodinokibi ransomware began disguising itself as tax agencies and judicial institutions, and used phishing scam emails to spread. Since the system default setting does not display file extensions, EXE viruses disguised as doc documents are often mistakenly identified as documents and opened by double-clicking.

Sodinokib ransomware disguised as a document


After June 2019, the price of Bitcoin began to slowly fall. In the second half of 2019, no new mining Trojan families with significant impact appeared.

3. 2019 Mining Trojan Infection Trends

3.1 Sample yield

According to statistics from Tencent Security's Threat Intelligence Center, mining Trojan attacks in 2019 showed a trend of "rising-falling-remaining stable". The data shows that mining Trojans were very active in the first half of 2019, with more than 100,000 attack samples detected per day at the peak; the attack trend slowed down after May, falling to 60,000 per day, and then remained stable. Overall, mining Trojans have a large number of infections on both hosts and servers, making mining Trojans one of the most serious security threats facing enterprises.

Daily production trend of mining trojans in 2019

3.2 Regional Distribution

From the perspective of regional distribution, mining Trojans were distributed throughout the country in 2019, with the most severely infected areas being Guangdong Province, Zhejiang Province, Beijing, and Jiangsu Province.

Regional distribution of malware infections in 2019

3.3 Industry Distribution

In terms of industry distribution, the industries most severely affected by mining Trojans in 2019 were the Internet, manufacturing, scientific research and technical services, and real estate.

Distribution of industries affected by mining trojans in 2019

3.4 Active Family

The three most active mining Trojan families in 2019 were WannaMiner, MyKings, and DTLMiner (Eternal Blue Downloader Trojan). MyKings is a long-established botnet family, while WannaMiner and DTLMiner appeared in early 2018 and late 2018, respectively. In 2019, these families infected more than 20,000 users. Their common feature is that they exploit the "Eternal Blue" vulnerability to spread in a worm-like manner and use a variety of persistent attack techniques, making them difficult to completely remove.

Top list of most active mining trojans in 2019

3.5 Main invasion methods

The top three main ways of intrusion of mining trojans in 2019 were vulnerability attacks, weak password blasting, and using botnets. Since mining trojans need to obtain more computing resources, they prefer to exploit common vulnerabilities and weak passwords, or control botnets that control a large number of machines for large-scale spread.

Main invasion methods of mining trojans


3.5.1 Vulnerability Attack Types The main type of vulnerability exploited by mining trojans is Windows system vulnerability ("Eternal Blue"), followed by WebLogic-related component vulnerabilities and Apache-related component vulnerabilities. Commonly used vulnerabilities include the following CVE numbers:
MS17-010 “Eternal Blue” CVE-2017-0143
WebLogic Deserialization Arbitrary Code Execution Vulnerabilities CVE-2017-10271, CVE-2018-2628, CVE-2019-2725
Apache Struts2 Remote Code Execution Vulnerability CVE-2017-5638
Apache Solr Remote Code Execution Vulnerability CVE-2019-0193
Apache Tomcat Remote Code Execution Vulnerability CVE-2017-12615

Main vulnerability attack types of mining trojans


3.5.2 Brute Force Attack Types The main brute force attack type of mining trojans is SQL brute force (including MsSQL, MySQL), followed by IPC$ and SSH. Due to the lack of security awareness of some IT managers, many databases and remote login services are set to weak passwords. The top five worst passwords in 2019 announced by SplashData are "123456", "123456789", "qwerty", "password" and "1234567", which are also the first choice of hackers in brute force attacks.

The mining trojan automatically matches the built-in dictionary containing a large number of simple passwords, which can easily crack such weak passwords and invade the system.

Main blasting attack types of mining trojans

4. Technical characteristics of mining trojans in 2019

4.1 Propagation characteristics

4.1.1 Supply Chain Infection
DTLMiner, which appeared at the end of 2018, used the upgrade function of existing software to distribute Trojans. It is a typical case of supply chain infection. Hackers inserted Trojan download links in the background configuration files, causing the software to download Trojan files when upgrading. Since the software itself has a huge number of users, the Trojan infected a large number of machines in a short period of time.

Configuration files tampered by DTLMiner


4.1.2 Cross-platform attack mining Trojans have undergone changes from controlling ordinary computers to mainly controlling enterprise hosts, and from only controlling Windows mining to mixed infection of multiple platforms. In 2019, Tencent Yujian Threat Intelligence Center discovered "Agwl", "Lolita Gang", WannaMine, Satan and other mining Trojans targeting Linux.
In March 2019, the latest variant of the Satan virus appeared. This variant virus indiscriminately attacks Windows and Linux systems, and then implants a ransomware virus in the affected computers to extort Bitcoin and a mining Trojan to mine Monero.

Satan virus cross-platform attack


We found that in order to maximize their profits, the black industry will also package mining Trojans with ransomware, remote control backdoors, clipboard thieves, DDOS and other Trojans for mixed attacks. The following are 7 popular families in 2019 and the types of viruses they implant in attacks:

Multiple virus combined attack


4.1.3 Social Networks
In December 2019, Yujian Threat Intelligence Center discovered the "Tiger" mining Trojan (LaofuMiner) spread through social engineering scams. The attacker disguised the remote control Trojan program as "hot news", "pornographic content", "privacy information", "fraud skills" and other file names, and sent them to the target computer through social networks. The victim double-clicked to view the file and the "Big Bad Wolf" remote control Trojan was immediately installed. Then the attacker used the remote control Trojan to control the infected computer to download the mining Trojan, and the infected computer immediately became a miner.
Some of the file names used in phishing attacks are as follows:

Phishing files used by LaofuMiner


4.1.4 VNC Exploitation
In March 2019, the Phorpiex botnet launched a brute force attack on the default port 5900 of the widely used remote management tool "VNC", downloading and running the GandCrab 5.2 ransomware on high-value servers to encrypt important system data and carry out extortion; if a computer with digital currency transactions was hacked, it would run a digital currency wallet hijacking Trojan to steal money; if the attacked computer was just an ordinary computer, it would be implanted with a Monero mining Trojan and become a miner computer controlled by Phorpiex.

Phorpiex blasts VNC services

4.1.5 Infectious viruses
In April 2019, the infectious virus Sality was discovered to use the established P2P network to spread the "Clipboard Thief" Trojan horse for the purpose of stealing and hijacking virtual currency transactions.
Sality can infect executable files on local hard drives, removable storage devices, and remote shared directories. It can also use the autoplay function of removable and remote shared drives to infect, and then download and execute the "Clipboard Thief" Trojan on the infected system.
Sality modifies the entry point of the executable file and replaces the original file code with the virus code, so that all infected programs execute the virus function when they are started:

Sality infected executable files


The "Clipboard Thief" Trojan determines the Ethereum or Bitcoin wallet address based on the character format characteristics in the clipboard content, and replaces the clipboard content with the specified wallet. If the user pastes and transfers the money at this time, the digital assets will fall into the hacker's pocket:

“Clipboard Thief” Trojan replaces wallet address

4.2 Malicious Code Execution

4.2.1 Powershell
On April 3, 2019, DTLMiner reflectively loaded a PE image in Powershell to execute the mining program in a "fileless" manner. This method runs malicious code directly in the Powershell.exe process, and the method of injecting it into a "white process" for execution may make it difficult to detect and remove the mining code. This is also the first time that a mining Trojan has been discovered that uses a "fileless" form of execution on a large scale.
DTLMiner installs a scheduled task on the infected system, repeatedly downloads and executes an encrypted Powershell script, and embeds a Base64-encoded character $Code64 in the script code. This character is actually the binary data of the XMRIG mining program.

Base64 encoded XMRig binary data


Powershell first decodes $Code64 into Bytes format, and then calls the Invoke-ReflectivePEInjection function to reflectively inject PE into memory to execute the mining program.

DTLMiner reflective injection executes mining program


4.2.2 DLL Sideloading
KingMiner first appeared in mid-June 2018. It is a Monero mining Trojan that performs brute force attacks on Windows server MSSQL. The attacker uses a variety of evasion techniques to bypass the virtual machine environment and security detection, making it impossible for some anti-virus engines to accurately detect and kill it.
In order to evade antivirus software detection, KingMiner uses DLL Side-Loading technology, also known as "white + black" technology, to launch the mining trojan, using normal white files with digital signatures to call malicious DLLs. It uses Microsoft's system file "Credential Backup and Restore Wizard" and digitally signed files from several well-known companies:
"GuangZhou KuGou Computer Technology Co.,Ltd."
“Google Inc”
"Fujian Creative Jiahe Software Co., Ltd."

White file signature used by KingMiner

4.3 Persistent Attack

4.3.1 Planning tasks
KingMiner uses RegisterTaskDefinition to create a scheduled task named WindowsMonitor to execute a Powershell script every 15 minutes; or installs a scheduled task WindowsHelper that is executed at system startup and installs a scheduled task WindowsMonitor in WindowsHelper to execute a VBS script code.

KingMiner installation schedule


4.3.2 WMI Timer
KingMiner is created as a timer named WindowsSystemUpdate_WMITimer in WMI, and the event consumer WindowsSystemUpdate_consumer that executes a script code is bound to the timer through the event filter WindowsSystemUpdate _filter. As the timer is triggered, the VBS script code is executed every 15 minutes.

KingMiner installs WMI timer


4.3.3 Blocking external intrusion
KingMiner determines whether the computer version is affected by the CVE-2019-0708 vulnerability, and whether the computer has installed the specified patches kb4499175, kb4500331, KB4499149, KB4499180, KB4499164 (these patches are the patch numbers for the CVE-2019-0708 Remote Desktop Service remote code execution vulnerability released by Microsoft).
If the CVE-2019-0708 patch is not installed, modify the settings to prohibit other machines from accessing the local machine through the remote desktop service, so as to prevent other Trojans from entering the system and achieve the purpose of monopolizing mining resources.

KingMiner shuts down RDP service

5. Mining Trojan Defense and Disposal Suggestions

5.1 Defense Plan

5.1.1 Password Management The server uses a secure password policy, especially the sa account password of the SQL server. Do not use the following weak passwords;
123456, admin, root, 123456789, qwert, password, 1234567, 12345678, 12345, lloveyou, 111111, 123123, 888888, 1234567890, 88888888, 666666, etc.
5.1.2 Port Management Server temporarily closes unnecessary ports (such as 135, 139, 445, 3389). For more information, please refer to: https://guanjia.qq.com/web_clinic/s8/585.html;
Enterprise users can deploy Tencent T-sec Advanced Threat Detection System (Tencent Yujie) to discover and track hacker attack clues. Tencent T-sec Advanced Threat Detection System is a unique threat intelligence and malicious detection model system developed based on the security capabilities of Tencent Security Anti-Virus Laboratory and relying on Tencent's massive data in the cloud and on the end. (https://s.tencent.com/product/gjwxjc/index.html)

Tencent Yujie Advanced Threat Detection System SQL Server Exploit Alert


5.1.3 Windows vulnerability repair The following high-risk Windows system vulnerabilities were repaired in a timely manner according to Microsoft's announcement;

MS17-010 EternalBlue Vulnerability
XP, Windows Server 2003, Win8 and other system access:
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598
Win7, win8.1, Windows Server 2008, Windows10, WindowsServer2016 and other systems: https://technet.microsoft.com/zh-cn/library/security/ms17-010.aspx
Office Formula Editor Vulnerability CVE-2017-11882
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11882
Lnk vulnerability CVE-2017-8464
https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/CVE-2017-8464
IE Vulnerability CVE-2018-8174
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-8174
RDP Service Vulnerability CVE-2019-0708
Windows XP, Windows 2003:
https://support.microsoft.com/zh-cn/help/4500705/customer-guidance-for-cve-2019-0708
Windows 7, Windows 2008R2:
https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499175
Windows 2008:
https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499180
You can also use Tencent Yudian or Tencent PC Manager to scan and repair vulnerabilities.
(https://s.tencent.com/product/yd/index.html)

Tencent Royal Point fixes system vulnerabilities

5.1.4 Server component vulnerability repair

a. Oracle WebLogic Arbitrary Code Execution Vulnerability
CVE-2017-10271
Affected versions
OracleWebLogic Server10.3.6.0.0
OracleWebLogic Server12.1.3.0.0
OracleWebLogic Server12.2.1.1.0
OracleWebLogic Server12.2.1.2.0
Official patch announcement:
https://www.oracle.com/security-alerts/cpuoct2017.html
CVE-2018-2628
Affected versions
Oracle WebLogic Server10.3.6.0
Oracle WebLogic Server12.2.1.2
Oracle WebLogic Server12.2.1.3
Oracle WebLogic Server12.1.3.0
Official patch announcement:
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
CVE-2019-2725
Affected versions
Oracle WebLogic Server10.3.6.0
Oracle WebLogic Server12.1.3.0
Official patch announcement:
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html
b. Apache related component vulnerabilities
Apache Struts2 Remote Code Execution Vulnerability CVE-2017-5638
Impact
Struts 2.3.5 – Struts 2.3.31
Struts 2.5 – Struts 2.5.10
Official patch announcement:
https://cwiki.apache.org/confluence/display/WW/S2-045?from=timeline&isappinstalled=0
Apache Solr Remote Code Execution Vulnerability CVE-2019-0193
Affected versions
Apache Solr < 8.2.0
Official patch announcement:
https://issues.apache.org/jira/browse/SOLR-13669
Apache Tomcat Remote Code Execution Vulnerability CVE-2017-12615
Affected versions
Apache Tomcat 7.0.0-7.0.79
Official patch announcement:
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
You can also use the Yuzhi Network Asset Risk Monitoring System developed by Tencent Security to check the security risks of network assets, conduct regular security scans, continuous risk warnings and vulnerability detection on the availability, security and compliance of the company's network assets and various applications. (https://s.tencent.com/product/narms/index.html)

Tencent Yuzhi detects Apache struts2 vulnerabilities

5.2 Disposal suggestions

If the host system is found to be significantly slow, or the server process occupies more than 80% of the CPU for a long time, it may be infected with a mining trojan. You can follow the steps below to confirm and remove it.
5.2.1 Confirmation of infection

1) Individual users
a. Use Windows Task Manager (or PCHunter or Process Explorer) or Linux command ps -aux to find the processes and files with high CPU usage. If the file is in the system directory, find a normal system file with the same name on another machine and compare it with the suspicious file; if it is in a software directory, find a normal file with the same name of the software and compare it with the suspicious file.

Mining process CPU usage


b. Use PCHunter or the command netstat -tup in Linux to find the IP and port of the process network connection, especially suspicious remote port connections such as 5559, 7777, 4444, 13333, etc. Then use the IP address to reverse the domain name, and pay attention to whether the domain name pointing to the IP contains words such as "miner", "pool", etc.
If system files or normal software files are excluded in step a above, and the file has a suspicious network connection as shown in step b, it may be infected with a mining Trojan.
2) Enterprise users are advised to deploy Tencent Yujie advanced threat detection system, which can identify the communication protocols in the mining process and detect mining behavior from network traffic.

Yujie detects mining behavior


5.2.2 Virus Removal After confirming that you are infected with the mining trojan, you can use Tencent PC Manager to remove it, or you can try to manually remove it by following the steps below:
1) In Windows system, use PCHunter or other management tools to exit suspicious processes, delete process files, and find and delete the items that start the file image in startup items, services, and scheduled tasks.

PCHunter deletes mining trojan startup items


2) In Linux system, use the command pkill -9 to exit the process;
Delete the process file and check the Trojan-related scheduled tasks displayed under the crontab command;
Delete the Trojan-related scheduled tasks in the following directories;
/var/spool/cron/root/
/var/spool/cron/crontabs
Delete Trojan-related startup items in the following directories;
/etc/rcS.d/
/etc/rc.d/init.d/
Enterprise users can deploy Tencent Yudian Terminal Security Management System on the server to clean up mining Trojans.


5.2.3 Cleaning up botnets

1) MyKings

MyKings botnet cleanup advice


Check the database job names and remove jobs containing malicious code;
Check the database storage procedures and clean up the contents containing malicious code;
Since the latest version of MyKings can also infect stubborn viruses such as "Dark Cloud" MBR and Rookit, users can use the PC Manager System First Aid Kit to check and clean it. User guide and download link: https://guanjia.qq.com/avast/283/index.html

Computer Manager System First Aid Kit cleans up MBR and kernel-level viruses


2) WannaMiner

WannaMiner Cleanup Suggestions

3) DTLMiner (Eternal Blue Downloader Trojan)

DTLMiner Cleanup Recommendations


Delete random name scheduled tasks: "VDoaC", "hadpeRz\oABwX", "lKNVFjCJm\oWuUXql"

DTLMiner random name planning task

The startup programs are:

/c "set A=power& call %A%shell -ep bypass -e "
/c "set A=power& call %A%shell -ep bypass -e ==" 
/c "set A=power& call %A%shell -ep bypass -e " 

6. Future Trends of Mining Trojans

6.1 “EternalBlue” vulnerability

Since the NSA weapons leak in 2017, the "Eternal Blue" vulnerability has been widely exploited by mining Trojans. As major security vendors fix and defend against the vulnerability, the impact of the vulnerability is gradually decreasing. However, according to the data, about 30% of the "Eternal Blue" vulnerability patches are still not installed, so it is expected that new mining Trojans that exploit the "Eternal Blue" vulnerability may appear in 2020.

6.2 BlueKeep Vulnerability

On May 15, 2019, Microsoft released a fix for the critical remote code execution vulnerability CVE-2019-0708 in Remote Desktop Services (formerly known as Terminal Services), which affects multiple versions of Windows, including Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows 2003, and Windows XP. Once an attacker successfully triggers the vulnerability, they can execute arbitrary code on the target system.
In September 2019, we noticed that the EXP code that exploits the CVE-2019-0708 vulnerability has been publicly released to the metasploit-framework Pull requests. After testing, it can achieve remote code execution. At the same time, in October 2019, the mining worm DTLMiner also added the CVE-2019-0708 vulnerability detection code to its attack module. Therefore, we speculate that a new mining Trojan that exploits this vulnerability is very likely to appear in 2020.

6.3 Botnet

Mining botnets such as MyKings, KingMiner, and WannaMiner infected a large number of machines in the early stage. After controlling the system, they carried out persistent attacks through scheduled tasks, database stored procedures, WMI and other technologies. Therefore, they can download the latest version of malicious code from the server at any time, making it difficult to completely remove them. In the future, security vendors will continue to fight against these virus gangs.

Reference Links


Detailed Analysis of the WannaCry Worm
https://www.freebuf.com/articles/system/134578.html


WannaMiner mining trojan attack incident report
https://mp.weixin.qq.com/s/FEyaQ_AHn2TZPy-5FeMP7A

Analysis of ZombieBoy Trojan
https://www.freebuf.com/column/157584.html


"VNC Robber" attack warning: Affected companies suffered a series of critical attacks from multiple viruses including GandCrab 5.2
https://www.freebuf.com/column/198957.html


Sality virus infects 30,000 computers and steals Bitcoin
https://www.freebuf.com/column/218404.html


Exploit attack against weak SQL passwords strikes again, KingMiner miners have controlled tens of thousands of computers
https://www.freebuf.com/column/221248.html


Eternal Blue Trojan Downloader Creates a New "Fileless Mining" Model
https://www.freebuf.com/column/200241.html


GandCrab quits the game, beware of the successor sodinokibi ransomware virus
https://www.freebuf.com/column/205215.html


BlueHero worm upgraded again, adding Stuxnet 3rd generation arsenal, one look and you'll be infected
https://www.freebuf.com/column/181604.html


The worm virus Bulehero once again uses "Eternal Blue" to attack and spread in corporate intranets
https://www.freebuf.com/column/180544.html


BuleHero 4.0 mining worm is really crazy, with more than ten ways to attack corporate networks
https://www.freebuf.com/column/219973.html


Supporting digital currency research in Shenzhen
https://finance.sina.com.cn/blockchain/coin/2019-08-19/doc-ihytcitn0105787.shtml


The quietly rising mining botnet: attacking servers to mine millions of Monero coins
https://www.freebuf.com/articles/web/146393.html


Detailed analysis report of the "Drive Life" Trojan that infected 100,000 computers in 2 hours to mine Monero
https://www.freebuf.com/column/192015.html


Analysis of a carefully planned targeted attack against DriveLife
https://www.freebuf.com/articles/system/192194.html

<<:  Vitalik Buterin: BCH upgrade does not provide more free funds, 5% of existing funds will be redistributed to miners

>>:  Can 51% attacks finally be eliminated? Ethereum founder Vitalik proposes a new concept for this

Recommend

You must choose a good day to get married. Facial features: Big nose

Whether in the past or now, marriage is basically...

Mole on a woman's face

A woman with a mole on her right cheek Women with...

Wu said weekly mining information: 0411-0417

1. Trent.eth forwarded a discussion in the Reddit...

Honest and reliable, a liar can be seen through at a glance

It is actually very difficult for an honest perso...

Divergence lines on the success line and defects of the success line

There is a line on the success line that rises ob...

Men with sunken nose often have problems with their financial luck

Although the bridge of the nose does not seem to ...

Data: GBTC shares worth 2048 Bitcoins will be unlocked this week

Data shows that in the past week, Grayscale incre...

Career line from Moon Hill to Saturn Hill

The career line in palmistry runs from the Moon H...

How to read the facial features of prosperous children

Children are the future of every parent, and they...