Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The Rust-based P2PInfect botnet is evolving with miner and ransomware payloads
Global Security

The Rust-based P2PInfect botnet is evolving with miner and ransomware payloads

AdminBy AdminJuly 7, 2024No Comments4 Mins Read
P2PInfect Botnet
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


P2PInfect Botnet

A malicious peer-to-peer network known as P2PInfect it was found to target misconfigured Redis servers with ransomware and cryptocurrency miners.

The development marks the transition of the threat from what appeared to be a dormant botnet with unclear motives to a financially motivated operation.

“The latest updates to the cryptominer, ransomware, and rootkit elements demonstrate the malware author’s continued efforts to profit from their illegal access and further spread the network as it continues to spread across the Internet,” Cado Security. said in a report released this week.

P2PInfect appeared almost a year ago and has since received updates for MIPS and ARM architectures. Earlier this January, Nozomi Networks uncovered using malware to deliver miner payloads.

It typically spreads by targeting Redis servers and its replication feature to turn victim systems into slave nodes of the server controlled by the attacker, then allowing the threat actor to issue arbitrary commands to them.

The Rust-based worm also has the ability to scan the Internet for more vulnerable servers, not to mention include an SSH password spraying module that tries to log in using common passwords.

Cyber ​​security

In addition to taking steps to prevent other attackers from attacking the same server, P2PInfect is known to change other users’ passwords, restart the SSH service with root privileges, and even perform privilege escalation.

“As the name suggests, it’s a peer-to-peer botnet where each infected machine acts as a node in the network and maintains connections to several other nodes,” said security researcher Nate Beal.

“This results in the botnet forming a huge mesh network that the malware creator uses to spread updated binaries across the network using a gossip mechanism. The author just needs to notify one peer, and he will notify all of his peers, and so on, until the new binary is fully distributed across the network.”

New changes in P2PInfect’s behavior include the use of malware to remove miner payloads and ransomware, the latter of which is designed to encrypt files matching certain extensions and deliver a ransom note asking victims to pay 1 XMR (~165 dollars).

“Since this is an untargeted and opportunistic attack, the casualties are likely to be low-value, so expect a low price,” Bill noted.

Also worth noting is the new rootkit for custom mode that uses LD_PRELOAD environment variable to hide their malicious processes and files from security tools, a technique also adopted by other hacking groups such as TeamTNT.

P2PInfect is suspected to be advertised as a botnet-for-hire service that acts as a conduit to deploy other attackers’ payloads in exchange for payment.

This theory is supported by the fact that the wallet addresses for the miner and the ransomware are different, and that the miner process is configured to take up as much processing power as possible, thereby preventing the ransomware from functioning.

“The choice of ransomware for malware, mainly targeting a server that stores ephemeral data in memory, is surprising, and P2Pinfect is likely to make much more profit from the miner than from the ransomware, due to a limited number of low-value files. can access because of the permission level,” Bill said.

“Rootkit implementation in user mode is a ‘good on paper’ addition to malware. If the initial access is Redis, a user-mode rootkit will also be completely ineffective, as it can only add a preload for the Redis service account, which other users likely won’t be logged in as.

Cyber ​​security

The disclosure comes after the AhnLab Security and Intelligence Center (ASEC) revealed that vulnerable web servers that have unpatched flaws or are poorly secured are being targeted by suspected Chinese-speaking threat actors to deploy cryptominers.

“Remote management is facilitated by installed web shells and NetCat, and with the installation of proxy tools targeting RDP access, data theft by threat actors is a distinct possibility,” ASEC said. saidhighlighting the use of Behinder, China Chopper, Godzilla, BadPotato, cpolar and The Q ring.

Fortinet FortiGuard Labs also noted that botnets such as UNSTABLE Candiand Skibidi abuse legitimate cloud storage and computing service providers to distribute malware payloads and updates to a wide range of devices.

“Using cloud servers for (command and control) operations ensures constant communication with compromised devices, making it more difficult for defenders to disrupt an attack,” security researchers Cara Lin and Vincent Lee said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.