DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Incidents

Prometei Botnet: 10k+ Infected Systems

March 14, 2023
Reading Time: 2 mins read
in Incidents

 

The Prometei botnet, a modular malware that has been active since 2016, has returned with a new version, Prometei v3, which has infected over 10,000 systems worldwide since November 2022.

The botnet is geographically opportunistic, with most victims reported in Brazil, Indonesia, and Turkey. The botnet is known for its large repertoire of components and multiple proliferation methods, including exploiting ProxyLogon Microsoft Exchange Server vulnerabilities. The botnet’s primary motivation is financial gain, as it mines cryptocurrency and harvests credentials from infected hosts.

Prometei v3 has improved its existing features to make forensic analysis more challenging and to further burrow its access on victim machines. After gaining a successful foothold, a PowerShell command downloads the botnet malware from a remote server, and the main module retrieves the actual crypto-mining payload and other auxiliary components on the system.

Support modules function as spreader programs designed to propagate the malware through Remote Desktop Protocol (RDP), Secure Shell (SSH), and Server Message Block (SMB).

Prometei v3 uses a domain generation algorithm (DGA) to build out its command-and-control (C2) infrastructure, packs in a self-update mechanism, and expands the set of commands to harvest sensitive data and commandeer the host.

The malware deploys an Apache web server bundled with a PHP-based web shell that can execute Base64-encoded commands and carry out file uploads. Talos noted that this new version aligns with previous assertions by threat researchers that the Prometei operators continuously update the botnet and add functionality.

Prometei v3 is notable for avoiding targeting Russia, suggesting that the threat actors behind the operation are likely based in the country. The infections have been indiscriminate, infecting systems across the globe, making it a significant threat to cybersecurity.

Organizations should take steps to secure their systems and networks, including applying software updates and patches and monitoring for unusual network activity. Additionally, they should have backup and recovery plans in place to minimize the damage caused by an attack.

Read More

Tags: BotnetCryptocurrenciesCyberattackincidentsIncidents 2023MalwareMalware CampaignMarch 2023Prometei
0
VIEWS
ADVERTISEMENT

Related Posts

Toyota Italy Suffers Data Leak

Toyota Italy Suffers Data Leak

March 29, 2023
Crown Resorts Allegedly Breached

Crown Resorts Allegedly Breached

March 29, 2023
North Korean hackers stealing cryptocurrency

North Korean hackers stealing cryptocurrency

March 29, 2023
English high school hit by ransomware attack

English high school hit by ransomware attack

March 29, 2023

More Articles

Incidents

Chinese Adult Site Leaking 14 Million User Details

August 8, 2022
Incidents

Planet Ice hacked and 240,000 skating fans’ details stolen

February 1, 2023
Vendors

Trellix

October 26, 2022
Quotes

”Security is now everyone’s responsibility…”

June 23, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.