Recently on 24th June, renowned security experts from Palo Alto Networks’ Unit 42 issued a warning against a new modified self-propagating malware that self initiates cryptojacking & DDoS attacks against Windows systems. The software operates under the name “Lucifer”.
In line with the study, Lucifer is a hybrid of cryptojacking & DDoS malware that leverages old vulnerabilities on the Windows platform.
Malware Is Already At Its Work
After breaking the safety infrastructure, attackers execute commands that release DDoS attacks. This enables them to install XMRig Miner, a well known Monero [XMR] mining app, to launch cryptojacking attacks.
Palo Alto Networks reveals that a related Monero wallet has already received 0.493527 XMR so far. That converts to approximately $32 USD, at the reporting time.
Basic Recommendations To Avoid Lucifer Malware
The researches behind the study outlined some basic recommendations to avoid such Lucifer’s malware:
“Applying the updates and patches to the affected software are strongly advised. The vulnerable software includes Rejetto HTTP server, Jenkins, Oracle Weblogic, Drupal, Apache Struts, Laravel framework, and Microsoft Windows. Strong passwords are also advised to stop dictionary attacks.”
Recent reports added that a gaggle of hackers behind the Kingminer botnet targeted vulnerable Microsoft SQL server databases to mine Monero at some point within the second week of June.
As reported earlier also, an another renowned cryptojacking used machine learning clusters on Microsoft’s Azure cloud computing network to mine Monero.