IOCs: Monero Mining Malware Families

Reading time ~5min


A recent study conducted by Recorded Future on 150 of the most prominent Dark Web message boards, marketplaces, and illicit services reveals that Litecoin is currently the second most widespread cryptocurrency among cyber-criminals. Researchers found Litecoin payment systems implemented on 30% of the sites they investigated, while Dash came second with a 20% share. Bitcoin Cash, Ethereum, and Monero came next, with 13%, 9%, and 6% respectively.

There are several ways that exist when distributing cryptocurrency miner malware. In our opinion based on the malware we currently see in the wild, Monero cryptocurrency is by far the most dominant choice for cyber-criminals due to its capabilities that is offering anonymity. Monero was the favorite on English-speaking sites, while Russian-speaking portals preferred Litecoin since they are left alone by the Russian authorities.

Continue reading “IOCs: Monero Mining Malware Families”

IOCs: Malware Authors Utilising Spectre/Meltdown Processor Vulnerabilities

Reading time ~2min


The recently disclosed processor vulnerabilities which affect most major processors, including ARM, Intel and AMD processors would not be left by malware authors unexploited. The Spectre and Meltdown CPU vulnerabilities (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) that attempt to exploit  “chip flaws” on affected processors, may allow an attacker to access sensitive data by bypassing several memory isolation mechanisms used by vendors that aim to increase CPU performance. This “chip flaw” may allow an attacker to even access memory information that is allocated for kernel-related tasks. Essentially, every processor that is developed since 1995 by the above chip manufactures, is vulnerable. Until the chip manufactures release workable patches that do not degrade CPU performance and cause several issues, user’s remain vulnerable to attacks, and more specifically malware that is exploiting the above-mentioned disclosed vulnerabilities.

Below we have a list of hashes of several possible malware families utilising the those vulnerabilities. MalwareHunters Team is consistently analysing and tracking several malware samples, therefore stay tuned as we update this list. In the meantime, ensure you stay up-to-date with the latest security patches on your web browser, AV, and any other software up-to-date.

Continue reading “IOCs: Malware Authors Utilising Spectre/Meltdown Processor Vulnerabilities”

Comparing WannaCry, NotPetya and Bad Rabbit

Reading time ~15min


All you need to know: Comparing WannaCry vs NotPetya vs Bad Rabbit

On 14 April 2017, Easter holiday, the mysterious ShadowBrokers group that over the past 7-8 months has leaked several gigabytes worth of the NSA’s weapons on software exploits published its most critical cyber weapon release on GitHub.

The latest release of the 0-days exploits targeted several Windows OS, including Windows XP, Windows Server 2012, Windows 8 and Windows 2008 R2. Microsoft addressed those vulnerabilities a few days later and were no longer 0-day exploits. As reported on Friday 14 April by Emptywheel, a ShadowBrokers release from early January gave NSA officials notice of some of the exploit names obtained by the mysterious person or group that was included on the Friday’s release. The extra time Microsoft needed to patch the bugs might have something to do with February’s unprecedented canceling of Patch Tuesday, or simply because Microsoft has paid off the Shadow Brokers secretly for the vulnerabilities.

Continue reading “Comparing WannaCry, NotPetya and Bad Rabbit”

New Ransomware dubbed ‘Bad Rabbit’ used NSA’s EternalRomance Exploit

Reading time ~10min


Earlier last week, a newly identified ransomware affected several computer systems around Europe.

The new strain of ransomware dubbed as ‘Bad Rabbit’ spreading primarily in Russia, Ukraine, Turkey, and Germany is utilising one of the leaked NSA’s exploits leaked by WikiLeaks earlier this year. According to several malware researchers and subsequent analysis, an NSA exploit (EternalRomance) was used to distribute itself and move across the network.

Cybersecurity firm Kaspersky Lab was monitoring the malware and compared it to the WannaCry and Petya attacks that caused so much chaos earlier this year. Continue reading “New Ransomware dubbed ‘Bad Rabbit’ used NSA’s EternalRomance Exploit”

New Rapid Spreading IoT Botnet Dubbed IoT_Reaper Strikes with Millions of Zombie’s Devices

Reading time ~7min


Since mid-September, a new IoT botnet has grown to massive proportions. Codenamed IoT_reaper (Reaper for this article), researchers estimate its current size at nearly two million infected devices.

According to researchers, the botnet is mainly made up of IP-based security cameras, network video recorders (NVRs), and digital video recorders (DVRs).

Continue reading “New Rapid Spreading IoT Botnet Dubbed IoT_Reaper Strikes with Millions of Zombie’s Devices”