Operation Prowli manipulated more than 40,000 machines for cryptocurrency mining

Operation Prowli manipulated more than 40,000 machines for cryptocurrency mining

According to a new advisory, the GuardiCore security team has discovered a malicious traffic manipulation group and cryptocurrency mining campaign that infected more than 40,000 machines across a variety of industries including finance, education, and government.

The campaign, dubbed Operation Prowli, used techniques such as exploits and brute-forcing cryptocurrencies to spread malware and take over devices such as network servers, modems and IoT devices. GuardiCore found that the biggest goal of the attackers behind Operation Prowli was to obtain large sums of money.

According to the report, the compromised devices were infected with a Monero miner and the r2r2 worm, a piece of malware that can perform SSH brute force attacks from compromised devices and enable "opportunistic operations" to impact new victims. In other words, through randomly generated blocks of IP addresses, r2r2 attempts to brute force SSH logins using the user's cryptocurrency private key and runs a series of commands on the victim after being compromised. GuardiCore wrote: All attacks were carried out in the same way, communicating with the same server to download some attack tools called r2r2 and a cryptocurrency miner.

Additionally, cybercrooks used an open-source URL called "WSO Web Shell" to modify compromised websites, redirecting website visitors to a traffic distribution system that then redirected them to various other malicious sites. Once redirected to a fake website, users fell victim to clicking on a malicious browser extension. The GuardiCore team reported that Operation Opportunistic successfully compromised more than 9,000 companies.

Last month, a new cryptocurrency hijacking malware used 500,000 computers to mine 133 million Monero coins in three days. Discovered and noted by cybersecurity firm 360, the malware, dubbed WinstarNssmMiner, poses new challenges to users in terms of antivirus due to its ability to destroy infected machines while mining cryptocurrency.


<<:  Ryan, XUC European and American Marketing Director: Exchange union will open a new era of digital asset exchanges!

>>:  Bit Power cheers for the candidates. Don’t be afraid of the college entrance examination, there will be many more obstacles in the future! !

Recommend

The fate of a woman with droopy eyes. How does the droopy eye look?

Women with round eyes and drooping eyes are not u...

What does a mole in the philtrum mean? OK?

Everyone has a few moles on their body, and some ...

The most indecent woman's face

The most indecent woman's face An indecent wo...

What does a woman with a big nose mean for a good temperament?

A woman with big nose wings represents different ...

Gavin: Head first mining will prevent DoS attacks

Implement " head first mining first mining&q...

How is your career luck from palmistry?

People have two treasures, hands and brains. Our ...

Analysis of the five moles that can harm a man's wife

As one of the traditional physiognomy techniques, ...

False Broken Palm Palmistry Diagram: What is a False Broken Palm?

False Broken Palm Palmistry Diagram: What is a Fa...