Ransomware attacker uses CoinMiner proxy to exploit multiple systems

June 8, 2024
1 min read

TLDR:

Researchers discovered that a ransomware actor exploited the proxy server of a CoinMiner attacker, leading to a chain of cyberattacks involving compromised infrastructures. The CoinMiner group’s proxy server was exposed, allowing the ransomware actor to gain admin access and distribute ransomware throughout the botnet and network, highlighting a new trend in which threat actors target each other’s infrastructure for more effective attacks.

Hackers can use proxy servers to hide their identities and access blocked websites or networks, making them anonymous.

The ransomware actor exploited the proxy server of a CoinMiner attacker, compromising the infrastructure and distributing ransomware throughout the network.

The attack demonstrated a new trend where threat actors target each other’s infrastructures for more effective cyberattacks.

Cybersecurity researchers at ASEC discovered that the ransomware actor exploited the proxy server of a CoinMiner attacker. The initial breach likely involved scanning for MS-SQL server administrator accounts and using xp_cmdshell to install a backdoor for downloading the CoinMiner malware. The ransomware actor then gained admin access via the proxy server and distributed ransomware throughout the botnet and network.

The CoinMiner group’s proxy server was exposed to an RDP scan attack launched by the ransomware actor, highlighting the risks of using compromised infrastructures for cyberattacks. The repeated access into the affected system attached to the proxy suggests that threat actors may intentionally target each other’s infrastructure for more effective attacks.

Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives