Operators of the Clipminer BotnetEarnedMore Than $1.7 Million

According to Symantec researchers, cel Clipminer botnet has already brought its operators at least $1.7 million by intercepting other people’s transactions and mining cryptocurrencies on infected machines.

The researchers say that Clipminer is based on the source code of another trojan, KryptoCibule, which means that it can be either a copycat or a more advanced version of the latter. Clipminer was noticed in January 2021, shortly after KryptoCibule was described in detail by ESET experts, which is another argument in favor of the “rebranding” of the malware.

Permiteți-mi să vă reamintesc că și noi am scris asta New Windows Trojan steals passwords from Chrome and stores them in MongoDB database.

In total, Symantec researchers identified 4375 unique cryptocurrency wallet addresses to which the funds stolen by Clipminer were transferred. Experts found approximately 34.3 BTC and 129.9 ETH in wallets controlled by attackers, and it is believed that other funds were previously withdrawn and “laundered” using mixer services.

Clipminer is distributed masquerading as game cracks, pirated software, P2P networks, torrent trackers and YouTube videos. The malware enters the system in the form of a WinRAR archive and automatically extracts the .CPL file from the archive, which loads the .DLL file.Symantec experts tell.

The DLL creates a new registry entry and places itself in the C:\Windows\Temp\ folder under a random name. Its purpose is to profile the infected host and download and install the Clipminer payload via Tor.

The malware itself launches the Onion service v3 with a unique address, monitors all keyboard and mouse actions on the infected computer, and also checks running processes to identify any analytical tools.

When there is no activity on the host, adică. the user is not present, Clipminer starts the XMRig miner for Monero mining, configured to use all available CPU power. Since monitoring of the machine is absent, there is no risk that someone will notice the slowdown in system performance.

Clipminer botnet operators
Clipminer changed wallet address

În același timp, the malware constantly controls the clipboard in search of copied cryptocurrency addresses and immediately replaces them with addresses belonging to the attackers, thus stealing other people’s payments.

Despre autor

Carina Wilson

Cu peste 10 ani de experiență în scris pentru media online și tipărită, Sunt un expert în furnizarea de copii clare și convingătoare.

Am scris pentru o agenție de top SEO copywriting, precum și pentru unele dintre cele mai cunoscute mărci din Marea Britanie, reviste si ziare.

Lasa un comentariu