Windows Server instances on AWS hijacked to mine cryptocurrency

Crypto mining
(Image credit: Shutterstock / Yevhen Vitte)

Cybersecurity researchers at Splunk have shared details about what they believe to be a re-emergence of a cryptocurrency botnet that’s specifically going after Windows Server running on Amazon’s cloud computing platform, Amazon Web Services (AWS).

Based on their detailed analysis, Splunk's Threat Research Team (STRT) says the campaign against AWS’ IP address space seems to originate from Chinese and Iranian IP addresses.

“The malicious actors behind this botnet specifically target Windows Server operating systems with Remote Desktop Protocol,“ reads Splunk’s advisory.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

After homing in on the targets, the attackers brute force their way into the virtual machines (VM) and proceed to install cryptomining tools to mine for the Monero cryptocurrency.

Telegram-powered C2 infrastructure

Interestingly, the STRT shares that all the compromised VMs had the executable binary for the Telegram Desktop client. The researchers reason that the attackers used this to help tie the compromised VMs into their botnet.

Threat actors abuse the Telegram API of the app’s desktop version, to execute commands on the compromised hosts and turn them into bots, which can then be made to automatically download additional tools and payloads. 

According to STRT, the crypto wallet that the mined Monero is transferred to was also used in previous campaigns dating back to 2018. 

Noting the other similarities between the current attack and the previous campaigns, including the use of similar exploitation techniques, STRT believes the current campaign is being conducted by the same threat actors that were behind the earlier campaigns.

Since the attacks don’t seem to be exploiting a software vulnerability, and are brute-forcing their way into the hosts, the researchers suggest admins review their passwords.

“As seen during our research, the best way to prevent these attack vectors is first patching your Windows servers and applying the latest security updates. The use of weak passwords is also a big factor in getting your servers compromised,” suggests STRT, adding that the use of Network Level Authentication (NLA) will also help thwart brute force attacks. 

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
A laptop with a red screen with a white skull on it with the message: &quot;RANSOMWARE. All your files are encrypted.&quot;
AWS S3 feature abused by ransomware hackers to encrypt storage buckets
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Mac users targeted with new malware, so be on your guard
Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)