Operation Prowli manipulated more than 40,000 machines for cryptocurrency mining

Operation Prowli manipulated more than 40,000 machines for cryptocurrency mining

According to a new advisory, the GuardiCore security team has discovered a malicious traffic manipulation group and cryptocurrency mining campaign that infected more than 40,000 machines across a variety of industries including finance, education, and government.

The campaign, dubbed Operation Prowli, used techniques such as exploits and brute-forcing cryptocurrencies to spread malware and take over devices such as network servers, modems and IoT devices. GuardiCore found that the biggest goal of the attackers behind Operation Prowli was to obtain large sums of money.

According to the report, the compromised devices were infected with a Monero miner and the r2r2 worm, a piece of malware that can perform SSH brute force attacks from compromised devices and enable "opportunistic operations" to impact new victims. In other words, through randomly generated blocks of IP addresses, r2r2 attempts to brute force SSH logins using the user's cryptocurrency private key and runs a series of commands on the victim after being compromised. GuardiCore wrote: All attacks were carried out in the same way, communicating with the same server to download some attack tools called r2r2 and a cryptocurrency miner.

Additionally, cybercrooks used an open-source URL called "WSO Web Shell" to modify compromised websites, redirecting website visitors to a traffic distribution system that then redirected them to various other malicious sites. Once redirected to a fake website, users fell victim to clicking on a malicious browser extension. The GuardiCore team reported that Operation Opportunistic successfully compromised more than 9,000 companies.

Last month, a new cryptocurrency hijacking malware used 500,000 computers to mine 133 million Monero coins in three days. Discovered and noted by cybersecurity firm 360, the malware, dubbed WinstarNssmMiner, poses new challenges to users in terms of antivirus due to its ability to destroy infected machines while mining cryptocurrency.


<<:  Ryan, XUC European and American Marketing Director: Exchange union will open a new era of digital asset exchanges!

>>:  Bit Power cheers for the candidates. Don’t be afraid of the college entrance examination, there will be many more obstacles in the future! !

Recommend

Eight facial features that are more likely to make you a mistress

Eight facial features that are more likely to mak...

Finland approves Virtual Currency Providers Act, effective May 1

The President of Finland has approved a new law t...

Protesters against El Salvador's president burn Bitcoin ATM

September 16 news, according to foreign media rep...

What are the pictures of boys with girly looks? How to explain

Now that the living standards have improved, chil...

What kind of women are destined to marry well? They are born to be rich.

Marriage is equivalent to our second marriage. Ma...

How to tell if a woman looks poor? Does a woman with a short chin look poor?

Whether a person is poor or not is often related ...

What is the impact of 24 teeth on the fate of people

Generally speaking, the most common people have 2...

A girl's mouth reveals her character

A girl's mouth reveals her character In physi...

What palmistry characteristics make people prone to infertility

If a couple has been married for more than two ye...

What is the face of a woman with a sunken uterus?

I believe many people are familiar with the Palac...

People with these faces will destroy what they can't get.

The villains in TV dramas all have this classic l...