Detailed by cybersecurity researchers at Trend Micro, such as several other cryptomining campaigns, this one is secretly compromising Linux systems, using their computing power to mine for Monero.   Cryptomining attacks are often distributed by exploiting common cybersecurity vulnerabilities or are hidden inside cracked software downloads, among other methods.  Compromising one system with cryptomining malware is unlikely to generate much profit, but attackers infect a large network of infected systems and servers to generate as much cryptocurrency as possible – with the associated energy bill being unintentionally picked up by the victim.   Also: A winning strategy for cybersecurity (ZDNET special report) The attacks often go undetected because, unless the machine is pushed too far, it’s unlikely the compromised user will notice the drop in the performance of their system.   Large networks of compromised systems mining for cryptocurrency can, therefore, produce a steady stream of income for cyber criminals – which is why this technique has become such a popular form of malware.  What makes this new cryptojacking campaign – which was uncovered in November – stand out from others is that it has incorporated a remote access trojan (RAT) into its attacks. The trojan, called Chaos RAT, is free and open source – and allows attackers to control remote operating systems.  The RAT is downloaded alongside the XMRig miner, which is used to mine for cryptocurrency, along with a shell script that is used to remove any other competing miners that might have previously been installed on the system.  Chaos RAT has several powerful functions, including the ability to download, upload and delete files, take screenshots, access file explorer and open URLs. Also: Follow this one simple rule for better phone security The trojan also appears to be used to connect to a command and control server that could be used for supplying additional malicious payloads. There’s the potential that the attackers could use the power of the trojan malware to conduct more damaging cyberattacks – for example, using Chaos to steal usernames and passwords or online bank details.  “On the surface, the incorporation of a RAT into the infection routine of a cryptocurrency mining malware might seem relatively minor,” Trend Micro researchers David Fiser and Alfredo Oliveira wrote in the blog post.  “However, given the tool’s array of functions and the fact that this evolution shows that cloud-based threat actors are still evolving their campaigns, it is important that both organizations and individuals stay extra vigilant when it comes to security,” they added.  To protect networks and cloud services from cryptomining malware and other cyberattacks, it’s recommended that organizations implement common best practices in cybersecurity, including timely patching and updating of software and applications, to lessen the chance of vulnerability exploitation in outdated versions.  Organizations could also consider deploying tools that can limit and filter network traffic to and from malicious hosts, such as firewalls, and intrusion detection and prevention systems.


This Linux botnet has found a novel way of spreading to new devicesCybersecurity: These are the new things to worry about in 2023This cryptocurrency mining malware now disables security software to help remain undetectedWhy cryptojacking malware is a bigger threat to your PC than you realiseThe scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats