Story image

Monero cryptocurrency miner enslaves Windows Server 2003 systems in botnet

02 Oct 2017

A malicious cryptocurrency miner is causing havoc in Windows web servers worldwide and those with unpatched systems are vulnerable to becoming part of a mining botnet.

ESET researchers report that the miner leverages a known vulnerability in Microsoft IIS 6.0 to covertly install the Monero cryptocurrency miner on unpatched servers.

Monero is an alternative cryptocurrency to Bitcoin. Since May 2017, cybercriminals have modified legitimate open source Monero mining software and installed it on the servers.

They then used it to create a botnet containing several hundred servers and mined more than AU$80,000 of Monero cryptocurrency.

While Microsoft has addressed the vulnerability CVE-2017-7269 in server updates, researchers say many servers remain outdated.

“As a significant number of systems are still vulnerable, users of Windows Server 2003 are strongly advised to apply the security update, KB3197835, and other critical patches as soon as possible,” comments Michal Poslušný, ESET malware analyst.

“It is a vulnerability in the WebDAV service that is part of Microsoft IIS version 6.0, the webserver in Windows Server 2003 R2,” researchers explain.

In 2015, Microsoft ended regular update support for Windows Server 2003, however it did release a patch for this vulnerability in June 2017. This was only after several malware authors spotted several critical vulnerabilities in its older systems, researchers explain.

However, automatic updated don’t always work and this impacts the ability to keep Windows Server 2003 up to date.

“If automatic updates fail, we encourage users to download and install the security update manually to avoid falling victim to malicious attacks,” Poslušný continues.

The miner is also an example of how minimal skill levels and low operating costs can create functioning malware – in this instance, it was a combination of genuine software manipulation and unpatched systems that created the perfect environment for the Monero miner.

Researcher Peter Kálnai says there are many reasons why Monero is an attractive cryptocurrency for mining purposes, even though Bitcoin is worth more in the market.

“Features such as untraceable transactions and a proof of work algorithm called CryptoNight, which favours computer or server central processing units, make the cryptocurrency an attractive alternative for cybercriminals. Bitcoin mining, in comparison, requires specialised mining hardware,” he explains.

While the attackers were active around the end of August, there has been no further activity from them and no further infections reported. Attackers have already started losing machines within their botnet.

Researchers believe a new campaign will be launched in the near future.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.