VictoryGate Botnet Spread Over 35k Devices via Infected USB Devices

ESET managed to sink several botnet command and control servers which spread through infected USB devices, thereby interrupting its activities.

The botnet affected devices in Latin America, particularly Peru, are known as VictoryGate and active since at least May 2019, and have more than 90% of the compromised devices. After the C&Cs have been sunk, ESET security researchers have been able to estimate the size of botnet to over 35,000 computers.

Figure-2-5
credit: We Live Security

VictoryGate mainly focused on Monero mining, but the malware allowed the botmaster to issue node commands for downloading and carrying out additional payloads. So ESET believes that the intent of the botnet may at some point have changed.

“This posed a considerable risk, given that we’ve identified compromised network traffic that stems from the public sector and from organizations in the private sector, including financial institutions,” the security firm notes.

The botnet abuses the resources of infected crypto miners with a sustained 90-99% CPU load, slowing the system down and potentially damaging it.

The botnet uses only infected removable devices for propagation. The malware copies all files on the USB drive to a secret root directory and uses fly-compiled Windows executables as obvious names.

The USB drive is common to the victim, with all files and directories in order. The script starts both the assigned file and the initial module for the malware, which copies itself to a percentage of AppData and puts a shortcut in the startup folder to run at reboot.

SEE ALSO:
WhatsApp and Video calls on Zoom Face Stricter Privacy Rules in Europe

The malware will insert an AutoIt-compiled script into legitimate Windows processes to ensure communication and downloading and executing secondary payloads with the control and control (C&C) server. The script also checks for infecting attached USB drives.

The bots may download and execute files, notify C&C of successful tasks, submit system information (username, hostname, installed antimalware product, AutomoIt version, and more), and tell C&C if the execution path is not the desired one.

The downloaded payloads observed were AutoIt-compiled scripts trying to inject the XMRig mining program into the ucsvc.exe file. Next, the mining of the infected device begins.

The botnet uses an XMRig proxy to mask the mining pool and avoids mining when the user opens Task Manager to conceal the use of the CPU. The cycle will be resumed once the Task Manager is closed.

ESET reports that an average of 2,000 bots mining during the entire day and that a total of 80 Monero (approximately $6,000) have been produced by botnet operations.

Leave a Reply
Previous Post
apple airplay

How to Set Up Your Girlfriend’s Apple AirPlay?

Next Post
McAfee

Sophos Releases Emergency Patch for XG enterprise firewall product to Fix SQL Injection

Related Posts