Malware

Specialists detect new and dangerous cryptocurrency mining malware in Asia and U.S.

After a long time, the cryptocurrency mining script known as Coinhive has finally ceased to be a problem for system administrators and website visitors. However, cryptojacking remains one of the main cybersecurity threats. Specialists in IT security services have discovered a new malware variant that takes advantage of the victims’ hardware to mine virtual assets.

The investigators of the security firm Trend
Micro detected a malware capable of exploiting multiple web servers and
performing brute force attacks to install XMRig, software to mine the
cryptocurrency Monero. The malware, known as BlackSquid, was identified last
May, mainly attacking servers in the United States and in Asian countries such
as Thailand.

“We call this malware BlackSquid because
we discovered that it employs eight known vulnerabilities, including
EternalBlue, DoublePulsar,
three server security failures and three web application vulnerabilities”,
the IT security services mentioned.

The most dangerous feature of BlackSquid is
that it employs multiple tactics to remain hidden, such as anti-virtualization,
anti-debugging, and anti-sandbox, all before completing its installation; in
other words, malware will only be installed if it can confirm that it has bypassed
detection.

If not enough, experts say that once the
malware infects a system, it will try to spread to other systems on the network
to make the infection bigger and, therefore, the gains for the cryptojackers will
increase.

Experts in IT security services mention that
BlackSquid arrives to compromised systems through infected pages, compromised
servers or removable drives, such as infected USBs. If it manages to bypass
detection, BlackSquid installs a version of the XMRig mining script; the
malware then scans the infected system looking for a video card. Graphical
processing units are one of the most targeted hardware pieces to mining
malware, so if one is detected, a second component of XMRig is executed to
abuse all hardware resources on the system.

Due to the behavior shown so far, specialists
from the International Institute of Cyber Security (IICS) believe that malware
is still in the test stage, as the code can still be modified to expand the
capabilities of BlackSquid.

To Top

Pin It on Pinterest

Share This