This Malware Has a Worrying Trick to Mine Monero on Cloud Servers

Published on by Coindesk | Published on

A recently observed form of malware uses a concerning new trick to avoid detection and mine cryptocurrency on cloud servers.

Two researchers, Xingyu Jin and Claud Xiao, from cybersecurity firm Palo Alto Networks, published a report on Thursday, saying that a nasty bit of software from bad actors dubbed the Rocke group is targeting public cloud infrastructure.

Once downloaded, it takes administrative control to first uninstall cloud security products and then inject code that mines the monero cryptocurrency.

The researchers found that the Rocke malware injected code to uninstall five different cloud security products from infected Linux servers - including offerings from top Chinese cloud providers, Alibaba and Tencent.

Adding insult to injury, the malware follows the uninstall steps set out in the products' user manuals.

"To the best of our knowledge, this is the first malware family that developed the unique capability to target and remove cloud security products."

At the time Talos researcher David Liebenberg said that Rocke will "Continue to leverage Git repositories to download and execute illicit mining onto victim machines."

Back in November, research from Israel-based cybersecurity firm Check Point Software Technologies showed that a monero mining malware, dubbed KingMiner.

Last week, a study by college researchers showed that hackers have mined at least 4.32 percent.

A study from McAfee, published in December, showed that instances of crypto-mining malware grew by over 4,000 percent.

x