Malware mining Monero discovered using hacking tools to infect Windows systems

Radmin and Mimikatz used to exploit flaw; targets firms in China, Taiwan, Italy, and Hong Kong

malware

Security researchers have discovered Monero mining malware that uses hacking tools such as Radmin and Mimikatz to propagate through Windows systems.

According to a blog post by security researchers at Trend Micro, the malware scans for open port 445 and exploit a Windows SMB Server Vulnerability MS17-010 (patched in 2017) for its infection and propagation routines. The malware was found to be targeting companies in China, Taiwan, Italy, and Hong Kong.

Researchers found a spike in activities between the last week of January and February this year, coinciding with regional holiday celebrations and events.

Mimikatz has been used with other hack tools and coin-mining malware in previous campaigns to collect user accounts and system credentials, while hackers have used Radmin to gain admin rights and other malware into targeted systems.

"However, this combination of Radmin and Mimikatz becomes a concern for data exfiltration of enterprise assets and information because of the randomly named and seemingly-valid Windows functions that may go undetected," said researchers.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Researchers said that the malware itself does not download the coinminer: "Instead, the miner malware payload is remotely downloaded and dropped through the command sent via Radmin to the target machine. While using outdated software, the modular structure of this payload may give way to other modular malware being included as well." 

Researchers noted that the hackers behind this malware campaign have intermediate-level skills.

"The use and stitching of multiple free tools available online from Python-compiled malware, open-source modules, outdated exploit and freeware hacktools may indicate the cybercriminal is still sharpening their criminal skill set," the researchers said, adding that users should regularly download patches from legitimate vendors as soon as they are released.

"For enterprises, we recommend having a multilayered protection system to detect, prevent, and resolve malware infections and attacks such as cryptocurrency miner-malware to prevent them from disrupting regular business operations." 

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Visit/policy-legislation/general-data-protection-regulation-gdpr/354577/data-protection-fines-hit-ps100m
General Data Protection Regulation (GDPR)

Data protection fines hit £100m during first 18 months of GDPR

20 Jan 2020