Researchers Found the Biggest Botnet Dedicated to Hidden Monero Mining

Researchers Found the Biggest Botnet Dedicated to Hidden Monero Mining

More than a half million Windows machines, mostly servers, have been zombified by Monero mining malware spread by a cyber gang that created the biggest mining botnet found to date. This botnet is called Smominru.

Several security companies have released their research on this cyber group activity. It is a relatively new gang. Crooks started their operations not earlier than the previous year.

All reports that earlier described the Smominru botnet, managed to cover only a small part of the gang’s operation. Partial botnet infrastructure has been previously provided by Kaspersky, TrendMicro, Panda Security. However, the latest study by Proofpoint sheds light on entire malware campaign.

Smominru botnet made $2.2 million with the help of 526,000 infected computers.

Collecting all the reports together, we can see a big picture of the largest crypto-mining botnet of all times. This botnet enslaved 526,000 computers into mining Monero cryptocurrency which allowed malware authors to earn almost 8,900 Monero coins that equals $2,242,800 at the time of writing.

To infect all those machines, crooks behind the Smominru botnet, utilized several sophisticated techniques. These include EternalBlue exploit and also EsteemAudit exploit. Although these are powerful exploits, only computers with unpatched Windows systems are vulnerable.

Besides Windows computers, botnet attacked Linux computers with MySQL servers and Microsoft SQL Servers.

As stated above, Monero mining is the primary operation, but the group is deploying several other virus strains onto hacked hosts like backdoors and Mirai DDoS bots.

The victims account maybe approaching 1 million

Although Proofpoint approximated the botnet size at about 526,000, another group of researchers, after evaluating different resources, estimates that this botnet includes almost 1 million bots.

Most targeted countries are Ukraine, Russia, Brazil, and Taiwan.

GuardiCore reports it found evidence that Smominru group is physically based in China. Proofpoint detected that Internet scanners that botnet uses have all US IP address.

It is interesting that Smominru botnet is two times bigger than Adylkuzz botnet. Adylkuzz was the first malware to make use of the EternalBlue exploit. Adylkuzz botnet was also aimed at mining Monero.

Looks like more and more botnet operators quit ransomware in favor of mining cryptocurrencies. Monero mining malware is quickly becoming the number one Internet threat.




Top 10 Reasons Why Security Software Fails

How Smart Hospitals Are Improving Healthcare

Medigy Innovation Network

Connecting innovation decision makers to authoritative information, institutions, people and insights.

Medigy Logo

The latest News, Insights & Events

Medigy accurately delivers healthcare and technology information, news and insight from around the world.

The best products, services & solutions

Medigy surfaces the world's best crowdsourced health tech offerings with social interactions and peer reviews.


© 2024 Netspective Foundation, Inc. All Rights Reserved.

Built on Dec 24, 2024 at 4:05am