Hackers have breached over 50,000 servers across the world to mine cryptocurrency using unusually sophisticated tools, according to a new report.
Cybersecurity firm Guardicore Labs said on May 29 that the large-scale malware effort – dubbed the “Nansh0u campaign” – has been ongoing since February, and had been spreading to over 700 new victims a day. The attack mostly targeted firms in the healthcare, telecoms, media and IT sectors.
Guardicore found 20 different malicious payloads in the malware over time, with new ones created “at least once a week” and put into use as soon as they were created. The package also installed a rootkit that prevented the malware’s removal.
The firm said it contacted the hosting provider of the attack servers and the issuer of the rootkit certificate.
“As a result, the attack servers were taken down and the certificate was revoked,” it said.
Notably, the cybersecurity firm said the attack used sophisticated tools like those used by nation states, a factor that indicates elite digital weaponry is becoming more readily accessible to cyber criminals.
The package was also written using Chinese language tools and placed on Chinese language servers, according to the firm.
“The Nansh0u campaign is not a typical crypto-miner attack. It uses techniques often seen in APTs [advanced persistent threats] such as fake certificates and privilege escalation exploits. While advanced attack tools have normally been the property of highly skilled adversaries, this campaign shows that these tools can now easily fall into the hands of less than top-notch attackers.”
The firm said the campaign demonstrates that strong credentials are vital in protecting companies’ assets.
“This campaign demonstrates once again that common passwords still comprise the weakest link in today’s attack flows. Seeing tens of thousands of servers compromised by a simple brute-force attack, we highly recommend that organizations protect their assets with strong credentials as well as network segmentation solutions,” the report concluded.
Infected network image via Shutterstock
View original post