• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
dirtymoe malware infects 2,000+ ukrainian computers for ddos and cryptojacking

DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking

You are here: Home / General Cyber Security News / DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking
February 2, 2024

The Laptop Unexpected emergency Response Workforce of Ukraine (CERT-UA) has warned that more than 2,000 pcs in the state have been infected by a pressure of malware identified as DirtyMoe.

The company attributed the marketing campaign to a menace actor it phone calls UAC-0027.

DirtyMoe, energetic considering that at the very least 2016, is able of carrying out cryptojacking and distributed denial-of-services (DDoS) attacks. In March 2022, cybersecurity firm Avast disclosed the malware’s potential to propagate in a worm-like vogue by getting gain of known security flaws.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The DDoS botnet is recognized to be sent by implies of an additional malware referred to as Purple Fox or through bogus MSI installer offers for preferred program these types of as Telegram. Purple Fox is also geared up with a rootkit that permits the danger actors to cover the malware on the machine and make it difficult to detect and remove.

Cybersecurity

The exact original entry vector employed in the campaign concentrating on Ukraine is at this time unfamiliar. CERT-UA is recommending that businesses keep their devices up-to-date, enforce network segmentation, and keep track of network website traffic for any anomalous activity.

The disclosure comes as Securonix in-depth an ongoing phishing marketing campaign known as Steady#URSA concentrating on Ukrainian navy staff with the intention of delivering a bespoke PowerShell backdoor dubbed Refined-PAWS.

“The exploitation chain is reasonably easy: it entails the target executing a malicious shortcut (.lnk) file which loads and executes a new PowerShell backdoor payload code (discovered inside an additional file contained inside of the identical archive),” security scientists Den Iuzvyk, Tim Peck, and Oleg Kolesnikov reported.

DDoS and Cryptojacking

The attack is explained to be associated to a risk actor identified as Shuckworm, which is also recognised as Aqua Blizzard (formerly Actinium), Armageddon, Gamaredon, Iron Tilden, Primitive Bear, Trident Ursa, UNC530, and Winterflounder. Lively considering the fact that at minimum 2013, it really is assessed to be part of Russia’s Federal Security Services (FSB).

Delicate-PAWS, in addition to setting up persistence on the host, makes use of Telegram’s blogging system called Telegraph to retrieve the command-and-manage (C2) info, a approach previously discovered as associated with the adversary because early 2023, and can propagate by way of detachable connected drives.

Cybersecurity

Gamaredon’s capability to spread by means of USB drives was also documented by Check out Stage in November 2023, which named the PowerShell-centered USB worm LitterDrifter.

“The Subtle-PAWS backdoor uses highly developed strategies to execute malicious payloads dynamically,” the researchers stated.

“They retail store and retrieve executable PowerShell code from the Windows Registry which can guide in evading standard file-based mostly detection strategies. This solution also aids in retaining persistence on the infected method, as the malware can initiate by itself once more immediately after reboots or other interruptions.”

Found this short article attention-grabbing? Abide by us on Twitter  and LinkedIn to study a lot more unique articles we put up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «former cia engineer sentenced to 40 years for leaking classified Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents
Next Post: Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks russian apt28 hackers targeting high value orgs with ntlm relay attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.