‘Prometei’ Botnet Spreads Its Cryptojacker Worldwide

'Prometei' Botnet Spreads Its Cryptojacker Worldwide

October 24, 2024 at 02:09AM

The “Prometei” botnet, active since 2016, targets outdated software vulnerabilities globally, infecting over 10,000 computers. Its primary goal is cryptojacking, particularly of Monero cryptocurrency, while also enabling further malicious activities. Notably, it avoids Russian targets, reflecting a deliberate safeguarding of Russian-language accounts and systems.

### Meeting Takeaways on Prometei Botnet

1. **Overview of Prometei**:
– Prometei is an 8-year-old modular botnet linked to the spread of cryptojackers and web shells.
– Initially discovered in 2020, evidence suggests it has been active since at least 2016, infecting over 10,000 computers globally across various countries including Brazil, Indonesia, Turkey, and Germany.

2. **Vulnerability Exploitation**:
– The botnet primarily exploits widely-used software vulnerabilities and poorly configured or unpatched systems, especially targeting organizations using unpatched Exchange servers.
– Prometei spreads effectively due to systemic weaknesses in cybersecurity practices in certain regions.

3. **Infection Process**:
– Initial infections are often clunky, beginning with failed login attempts and exploiting outdated vulnerabilities such as BlueKeep and EternalBlue to gain access.

4. **Target Selection**:
– Likely targets include systems that are unmonitored or have not undergone regular security updates, suggesting a strategic approach to maximize impact on vulnerable environments.

5. **Operational Mechanics**:
– Prometei uses a domain generation algorithm (DGA) for resilience against domain blocking and manipulates system settings to bypass firewall restrictions.
– It uses various techniques to extract plaintext passwords and manipulates security features like Windows Defender to maintain its stealth.

6. **Main Objectives**:
– The primary function of Prometei is cryptojacking, particularly mining Monero without consent from the infected machine owners.
– It also establishes a persistent web shell for further malicious activities, allowing attackers to upload additional harmful files and execute commands.

7. **Associated Risks**:
– Cryptojacking activity often indicates other malicious operations occurring within infected systems, highlighting the need for comprehensive malware monitoring.

8. **Geographical Limitations**:
– Notably, Prometei avoids targeting certain former Soviet countries, employing mechanisms to protect Russian-language targets and demonstrating a degree of geographical operational sensitivity.

9. **Cultural Context**:
– The name “Prometei” connects to the myth of Prometheus, symbolizing resilience despite continuous threats, as reflected in the botnet’s ability to persistently exploit compromised systems.

These takeaways summarize the key insights from the meeting, reflecting the ongoing threat posed by the Prometei botnet and its implications for cybersecurity.

Full Article