Tencent Yujian: KingMiner miners have controlled tens of thousands of servers

Tencent Yujian: KingMiner miners have controlled tens of thousands of servers

According to BlockBeats, Tencent Security's Threat Intelligence Center detected a KingMiner variant attack. KingMiner is a Monero mining Trojan that performs brute force attacks on Windows server MS SQL. The Trojan first appeared in mid-June 2018 and quickly released two improved versions. The attacker used a variety of evasion techniques to bypass the virtual machine environment and security detection, resulting in some anti-virus engines being unable to accurately detect it.

The current version of KingMiner has the following features:

1. Exploit and intrude MSSQL through brute force attacks;

2. Use WMI timers and Windows scheduled tasks to carry out persistent attacks;

3. Disable the RDP service on the machine with the CVE-2019-0708 vulnerability to prevent other mining groups from invading and monopolizing server resources for mining;

4. Use base64 and specially encoded XML, TXT, PNG files to encrypt the Trojan program;

5. Use the signature files of Microsoft and several well-known manufacturers as the parent process, and start the Trojan DLL in "white + black".

According to statistics from Tencent Security's Yujian Threat Intelligence Center, KingMiner affected more than 10,000 computers, with the worst-affected areas being Guangdong, Chongqing, Beijing, and Shanghai.


Safety Tips


Tencent Yujian recommends that enterprises take targeted defensive measures against the technical characteristics of the KingMiner mining trojan:

1. Fix the privilege escalation vulnerability CVE-2019-0803 according to Microsoft's official announcement:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0803

2. Strengthen the SQL Server server and patch the server security vulnerabilities. Use a secure password policy and a strong password. Do not continue to use weak passwords, especially the sa account password, to prevent hackers from brute force cracking.

3. Modify the default port of SQL Sever service, change the default 1433 port setting based on the original configuration, and set access rules to deny 1433 port detection.

4. Enterprise users can deploy Tencent Yudian Terminal Security Management System on the server to prevent such attacks.


5. We recommend that enterprises use Tencent Yujie Advanced Threat Detection System to detect various suspicious attack behaviors of unknown hackers. Yujie Advanced Threat Detection System is a unique threat intelligence and malicious detection model system developed based on the security capabilities of Tencent Anti-Virus Laboratory and relying on Tencent's massive data in the cloud and on the terminal. (https://s.tencent.com/product/gjwxjc/index.html)



<<:  Will Bitcoin miners still be mining in 2140?

>>:  South Korea is drafting a cryptocurrency bill that will classify virtual currencies as digital assets

Recommend

Mining Network

2017 has come to an end. This year, Bitcoin has e...

Bitcoin startup BitPesa sues Kenyan mobile payments giant Safaricom

According to Kenyan media the Daily Nation, on Tu...

What kind of palmistry can make you rich?

What kind of palmistry can make you rich? Stateme...

Where are the good moles on the face?

Moles can be divided into good and evil. So, let’s...

Judging from a man's appearance whether he will date a prostitute

Although everyone loves beauty, being too lustful...

JPMorgan CEO remains skeptical of cryptocurrencies

JPMorgan Chase CEO Jamie Dimon has stated his con...

Walking posture and personality

People have different moods and temperaments, so ...

Which men should you be cautious with?

For many women, when interacting with men, they n...

Antec 1250W Power Supply Review

Power supply model: EGX1250-INT Brand: Anmei Rate...

What is the Children's Palace? Detailed explanation of the Children's Palace

What is the Palace of Children? Where is it locat...

It is difficult to meet noble people in life.

People who can meet noble people in life always h...