Widespread Campaigns Infects 50k Servers with Cryptomining Malware (2024)

A rapidly-expanding campaign has infected 50,000 servers with malware that mines an open source cryptocurrency called TurtleCoin.

Up to 50,000 servers were infected over the past four months as part of a high-profile cryptojacking campaign, believed to orchestrated by Chinese-language adversaries.

Researchers with Guardicore Labs, who disclosed the campaign Wednesday, said that the Nansh0u​ campaign (named due to a text file string in the attacker’s servers being called Nansh0u) is “not another run-of-the-mill mining attack.”

The cryptomining malware, which targets an open source cryptocurrency called TurtleCoin, is being spread via a sophisticated campaign relying on techniques often utilized by advanced persistent threat (APT) groups, such as using certificates and 20 different payload versions.

“Breached machines include over 50,000 servers belonging to companies in the healthcare, telecommunications, media and IT sectors,” researchers said in an analysis. “Once compromised, the targeted servers were infected with malicious payloads. These, in turn, dropped a crypto-miner and installed a sophisticated kernel-mode rootkit to prevent the malware from being terminated.”

The Campaign

The campaign has been ongoing since February, researchers said. In April, researchers noticed three similar attacks – all had source IP addresses originating in South Africa, shared the same attack process and used the same breach method.

Widespread Campaigns Infects 50k Servers with Cryptomining Malware (2)

“Looking for more attacks with a similar pattern, we found attacks dating back to February 26, with over seven hundred new victims per day,” said researchers. “During our investigation, we found 20 versions of malicious payloads, with new payloads created at least once a week and used immediately after their creation time.”

The campaign was rapidly infecting servers – in fact, within the timeframe of April 13 to May 13, researchers observed the number of infections double to 47,985.

Victims were mostly located in China, the U.S. and India – however, attackers also reached victims in up to 90 countries, Guardicore researchers told Threatpost.

Researchers also believe that China-linked attackers are behind the attack, as the hackers chose to write their tools with Chinese-based programming language EPL, and many log files and binaries on the servers included Chinese strings.

The Attack Process

Attackers would seek out MS-SQL servers by scanning IP addresses for open MS-SQL ports. They then would use brute force methods to breach those exposed machines (using commonly-utilized credentials).

Widespread Campaigns Infects 50k Servers with Cryptomining Malware (3)

“The tool attempts to login to each MS-SQL server using tens of thousands of common credentials,” researchers said. “Once authentication succeeds – the server’s address, username and password are saved to a file for future use.”

From there, the bad actor logged into the victims’ systems, execute MS-SQL commands on the machines, and download payloads and cryptocurrency miner malware from a remote file server.

The commands specifically execute a known privilege escalation exploit (CVE-2014-4113) that runs the malicious payload with SYSTEM privileges.

Researchers also collected 20 payload samples from the attacker servers – all which had several functionalities, including the abilities to execute a crypto-currency miner and protect the miner process from termination through a kernel mode rootkit. Specifically, the closed-source JCE miner and open source XMRig miner were utilized to target the TurtleCoin cryptocurrency.

“The attacker’s overt goal was cryptomining,”Daniel Goldberg, security researcher with Guardicore Lab, told Threatpost. “This is what takes up the victims’ resources and directly generates money. A side goal is access. The attacker kept careful logs of breached servers that he could later reuse or sell.”

When asked how much the attackers were profiting from the cryptomining malware, researchers told Threatpost that TurtleCoin is a privacy oriented cryptocurrency, making it extremely difficult to get an accurate and reliable count of the amount in the wallet.

Sophisticated Arsenal

The campaign “uses techniques often seen in APTs such as fake certificates and privilege escalation exploits,” researchers said. “While advanced attack tools have normally been the property of highly skilled adversaries this campaign shows that these tools can now easily fall into the hands of less than top-notch attackers.”

One such technique is that many payloads in the campaign drop a kernel mode driver and used digital signatures to mask suspicious activity. Kernel-mode drivers are executable files run within the operating system’s kernel. As such, they have high-privileged access to sensitive data structures and resources.

This particular driver had a digital signature issued by Certificate Authority Verisign. That certificate has the name of a fake Chinese company (Hangzhou Hootian Network Technology). Researchers contacted Verisign and informed them of the certificate resulting in the certificate being revoked.

The driver was also protected and obfuscated with VMProtect, a software tool “that attempts to frustrate reverse engineers and malware researchers,” said researchers.

The Need for Strong Credentials

Researchers pointed to weak authentication username and passwords on Windows MS-SQL servers as a main reason behind the attack – and urged system administrators to consider strong credentials.

“This campaign demonstrates once again that common passwords still comprise the weakest link in today’s attack flows,” they said. “Seeing tens of thousands of servers compromised by a simple brute-force attack, we highly recommend that organizations protect their assets with strong credentials as well as network segmentation solutions.”

Want to know more about Identity Management and navigating the shift beyond passwords? Don’t missour Threatpost webinar on May 29 at 2 p.m. ET. Join Threatpost editor Tom Spring and a panel of experts as they discuss how cloud, mobility and digital transformation are accelerating the adoption of new Identity Management solutions. Experts discuss the impact of millions of new digital devices (and things) requesting access to managed networks and the challenges that follow.

Widespread Campaigns Infects 50k Servers with Cryptomining Malware (2024)

FAQs

What is cryptomining malware? ›

Cryptomining malware is specifically designed to exploit a target's computer resources, often through a browser or JavaScript. After getting infected with cryptominer malware through a link or other malicious source, the cryptojacking code embeds itself in your machine.

What is an example of cryptojacking? ›

Cryptojackers often bait users into clicking on links in phishing emails and downloading malicious code to their devices. Another approach is to infect websites using cryptojacking command lines embedded in HTML code—this code then runs the mining program automatically when the user opens the infected webpage.

How common is cryptojacking? ›

Considering this, cryptojacking is a way for criminals to cut costs while increasing their potential for financial gain. That's part of why it's growing in popularity, with 332 million cryptojacking attacks tallied in the first half of 2023, a record 399 percent increase from 2022.

What are some signs that you have cryptomining malware installed on a computer? ›

Some common signs of a potential cryptojacking breach are slower computer speeds, unusually high CPU usage, and overheating hardware. But some cryptojackers take measures to mask these signs.

How harmful is crypto mining? ›

UN Study Reveals the Hidden Environmental Impacts of Bitcoin: Carbon is Not the Only Harmful By-product. Global Bitcoin mining is highly dependent on fossil fuels, with worrying impacts on water and land in addition to a significant carbon footprint.

What is the risk of crypto mining? ›

Crypto mining is operationally and financially risky. Mining hardware can break or become quickly obsolete, requiring downtime and expensive repairs. Fluctuating cryptocurrency prices and electricity costs impose additional financial risks that cannot entirely be mitigated.

Is crypto jacking illegal? ›

Cryptojacking might seem like a harmless crime, since the only thing 'stolen' is the power of the victim's computer. But the use of computing power for this criminal purpose is done without the knowledge or consent of the victim, for the benefit of the criminal who is illicitly creating currency.

What is the most cybercrime committed using cryptocurrency? ›

One of the most notorious uses of cryptocurrency in cybercrime is ransomware. Ransomware attacks, one of today's most important cyber security problems, especially for organizations, have also increased in parallel with the rise of cryptocurrencies.

How do you tell if you have mining malware? ›

The common symptoms alarming the possible crypto-mining malware infection threat are the following:
  1. High CPU usage.
  2. Slow performance, lagging.
  3. Overheating.
  4. Increased internet traffic.
Aug 10, 2023

How do you know if you have been cryptojacked? ›

Here are several methods you can use to detect cryptojacking: Decreased performance – cryptojacking causes decreased performance on computing devices. You should watch out for slower system performance, as well as devices that run slowly, crash, or exhibit unusually poor performance.

How do you detect cryptojacking? ›

Central Processing Unit (CPU) usage:

A good cryptojacking test is to check the central processing unit (CPU) usage of your device using the Activity Monitor or Task Manager. However, bear in mind that processes might be hiding themselves or masking as something legitimate to hinder you from stopping the abuse.

How do you know if you are being crypto mined? ›

Users can check the CPU usage via Task Manager (Windows) or Activity Monitor (macOS). The CPU usage should generally stay below 20-30%, but it exhibiting unexpected spikes can be the result of a crypto malware running in the background. Unexpected increase in electricity costs.

How to tell if your computer is secretly mining cryptocurrency? ›

Unusual CPU Usage. One of the most telltale signs of cryptojacking or malware infection is a sudden and unexplained spike in CPU usage. Since crypto mining requires significant computational power, an infected device will often show high CPU usage even when not performing any intensive tasks.

Can you tell if your computer is infected with malware? ›

Frequent error messages. Unexpected pop-up windows. New applications (like web browser toolbars) that appear without you downloading them. Overworked hard drive, which you can detect if your device's internal fan seems to be whirring and working hard when you aren't doing much.

How do I get rid of mining malware? ›

How to Delete a Miner Virus
  1. Step 1: start the system in Safe Mode. Restart your PC. ...
  2. Step 2: run antivirus software. Make sure that you have legit antivirus software installed. ...
  3. Step 3: restart your device.
  4. Step 4: Don't forget to update the OS and software. Check for system updates.
Jul 4, 2023

What is an example of cryptomalware? ›

CryptoLocker is one of the most dangerous examples of crypto ransomware, a malicious program that encrypts everything on your device and demands you pay a ransom to have your data back. Coinhive. Coinhive was one of the best-known cryptojackers using JavaScript.

What does Coinminer malware do? ›

The Coinminer malware is malicious software that infiltrates the victim's computer and uses its hardware, such as the CPU, GPU, and RAM, to mine cryptocurrency. Coinminers often use stealth techniques, such as mining only during certain hours, to remain undetected.

Is cryptojacking a malware? ›

Cryptojacking is a form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.

Top Articles
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 5885

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.