Currently, the malware is targeting unpatched in Brazil but researchers believe it’s about time it will spread worldwide.

Unpatched routers manufactured by MikroTik have become potential targets of cryptojacking malware campaigns in Brazil. According to the analysis of Trustwave’s researcher Simon Kenin, an unprecedented increment in web-based cryptojacking/cryptomining attacks in Brazil has been observed. Over 170,000 routers manufactured by the Latvia-based networking firm MikroTik are used in this campaign.

Initially, a large number of Brazilian users were targeted by cybercriminals to create mining botnet army. This army of botnets is used to spread malware for infecting the compromised . An outdated software patch is believed to be the main cause of compromising of such a massive number of routers.

Update MikroTik routers - 200,000 devices hit by cryptocurrency malware  - update mikrotik routers 200000 devices hit by cryptocurrency malware 3 - Update MikroTik routers – 170,000 devices hit by cryptocurrency malware

Shodan search results of exposed MikroTik routers in Brazil (Image credit: TrustWave)

According to a blog post by Simon, what happened was that the company patched a remote access vulnerability in April 2018. This vulnerability could have allowed attackers to gain unauthorized access to MikroTik routers remotely. After fixing the flaw, the security researchers published a PoC (proof-of-concept) exploit to explain the method of gaining access to MikroTik devices.

The PoC, which was written in Python, was utilized by cybercriminals to infect the routers using code that loads the browser-based cryptomining software by CoinHive. So, when a user attempts to access the internet using the MikroTik proxy will encounter an HTTP error because the Javascript of CoinHive has been injected into web pages that users access via compromised routers. The device then starts mining for Monero cryptocurrency for the attackers.

This particular vulnerability has been used in at least three cryptomining attacks, the first of which affected around 183,700 routers. Subsequent two attacks managed to affect 16,000 and 2,000 routers located in Moldova. This means, the campaign isn’t limited to any particular geographic location, which indeed is an alarming feature of the campaign. That’s why security researchers are urging MikroTik routers users to immediately patch their devices because cybercriminals are hunting for unpatched routers.

Update MikroTik routers - 200,000 devices hit by cryptocurrency malware  - update mikrotik routers 200000 devices hit by cryptocurrency malware 2 - Update MikroTik routers – 170,000 devices hit by cryptocurrency malware

For your information, the April patch was a result of MikroTik’s own investigation in which the security flaw was detected. This particular flaw can serve as a “special tool to connect to the [administration] port, and request the system user database file.” The flaw lets attackers read any file off the router, which allows them an easy opportunity to steal . The user database file is most crucial in this regard because of MikroTik stores usernames and passwords in plaintext format in this database.

Using the salt--stretch cryptographic technique, an attacker can verify if the password is correct or not by matching it against an entry in the database and gain a unique match string. The MikroTik admin-port is being used the attack-vector in the latest campaigns.

Kenin revealed that attackers replaced MikroTik’s built-in web proxy file called error.html, which is launched whenever there is a proxy-related error, and uploaded a webpage in its place that leads to CoinHive’s cryptomining software. So, you only get cryptojacked when you are using a MikroTik proxy to access the web and the mining process lasts only until you exit the browser.

Companies often make the mistake of ignoring these kinds of vulnerabilities and patches are delayed for weeks or months, which helps cybercriminals in more than one ways.

Image credit: Depositphotos



Source link
Based Blockchain Network

LEAVE A REPLY

Please enter your comment!
Please enter your name here