Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

NoaBot Unleashes Stealthy Crypto Mining

January 11, 2024
Reading Time: 2 mins read
in Alerts

tThis botnet, exhibiting wormable self-spreader capabilities and an SSH key backdoor, has caught the attention of security researchers. NoaBot utilizes an SSH scanner to search for servers susceptible to dictionary attacks, allowing it to brute-force and gain remote access by adding an SSH public key. The botnet, compiled with uClibc, distinguishes itself by changing how antivirus engines detect the malware, with signatures appearing as an SSH scanner or a generic trojan rather than the typical Mirai signature.

Despite its Mirai foundations, NoaBot differentiates itself by incorporating an SSH scanner into its spreader module, a technique that enhances its ability to propagate. The attack chain employs obfuscation tactics, rendering analysis challenging for security experts. Moreover, NoaBot deploys a modified version of the XMRig coin miner. Notably, this variant stands out as it lacks information about the mining pool or wallet address, making it difficult to assess the profitability of the illicit cryptocurrency mining scheme.

The NoaBot campaign appears to be linked to another involving the P2PInfect Rust-based malware family. In recent attacks, threat actors experimented with replacing NoaBot with P2PInfect, indicating potential attempts to pivot to custom malware. NoaBot’s obfuscation tactics and the absence of mining pool and wallet address information contribute to its elusive nature. With 849 identified victim IP addresses spread globally, particularly concentrated in China, this Mirai variant underscores the ongoing challenge of securing networks against SSH credential dictionary attacks and emphasizes the importance of restricting arbitrary SSH access for enhanced cybersecurity.

Reference:
  • You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance
Tags: BotnetsCryptominersCyber AlertCyber Alerts 2024Cyber RiskCyber threatJanuary 2024MalwareMiraiNoaBot
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial