Article 4NFT3 New Norman Cryptominer Uses Dynamic DNS for C2 Communication

New Norman Cryptominer Uses Dynamic DNS for C2 Communication

by
Fnord666
from SoylentNews on (#4NFT3)

upstart writes:

Submitted via IRC for SoyCow7671

New Norman Cryptominer Uses Dynamic DNS for C2 Communication

A new cryptominer malware that infected almost all the computers on a company's network within a year uses DuckDNS for command and control (C2) communications with its masters.

[...] The new miner malware strain dubbed Norman by the Varonis Security Research team was discovered while actively mining for Monero using the computing resources of the infected workstations and servers as directed by its operators.

All infected hosts on the network were very easily detected by the use of DuckDNS which is a dynamic DNS service designed to help users create custom domain names easier.

According to the researchers who found this new cryptomining malware, "most of the malware from this case relied on DuckDNS for command and control (C&C) communications, to pull configuration settings or send updates."

Besides multiple miner malware samples among which Norman stood out as not having been seen before in the wild, Varonis' research team also discovered several password dumping tools and a hidden PHP shell, with some of them having infected the systems a few years earlier.

[...] Malware developers are targeting most platforms with their malicious payloads, their cryptominers having been observed while attempting to infect all types of platforms and devices, from Windows, Linux, and macOS computers to Android devices and cloud services.

Original Submission

Read more of this story at SoylentNews.

External Content
Source RSS or Atom Feed
Feed Location https://soylentnews.org/index.rss
Feed Title SoylentNews
Feed Link https://soylentnews.org/
Feed Copyright Copyright 2014, SoylentNews
Reply 0 comments