Bitdefender researchers recently found and analyzed a worm-cryptominer combo that uses a series of exploits to move laterally and compromise victims. What makes it interesting is that it pauses the resource-intensive cryptomining process if it finds popular games running on the victim’s machine. The investigation revealed that the worm-cryptominer has been constantly updated by its developers. Some of its modules were updated to make it difficult for security researchers to analyze it, as well as improve lateral movement and other capabilities.
Dubbed Beapy/PCASTLE by previous security researchers, Bitdefender takes a deeper dive into the behavior of the worm-cryptominer combo, offering a detailed changelog into how its modules and components have been updated over time. The Bitdefender investigation reveals how the worm and malware components have been used in conjunction to spread and mine cryptocurrency.
A new attack vector, not previously associated with delivering cryptocurrency miners or covered in past research, was also revealed during the investigation. A supply chain attack broke out against users of DriveTheLife, a potentially unwanted application (PUA), and against users of other similar apps that seem to run on the same infrastructure. It was found that a component of DriveTheLife that normally downloads and executes files from a legitimate domain, was apparently being manipulated and used to download a malicious payload on the victim’s machine from a domain operated by attackers.
Key findings:
For a more detailed technical analysis, please check out the technical paper below:
tags
Liviu Arsene is the proud owner of the secret to the fountain of never-ending energy. That's what's been helping him work his everything off as a passionate tech news editor for the past few years.
View all postsJune 08, 2023
May 02, 2023
January 11, 2023
January 05, 2023