{"id":15210,"date":"2019-04-29T10:10:03","date_gmt":"2019-04-29T18:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/29\/news-8959\/"},"modified":"2019-04-29T10:10:03","modified_gmt":"2019-04-29T18:10:03","slug":"news-8959","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/29\/news-8959\/","title":{"rendered":"Electrum DDoS botnet reaches 152,000 infected hosts"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 29 Apr 2019 17:00:00 +0000<\/strong><\/p>\n<p><em>By J\u00e9r\u00f4me Segura, Adam Thomas, and S!Ri<\/em><\/p>\n<p>We have been closely monitoring the situation involving the continued attacks against users of the popular Electrum Bitcoin wallet. Initially, victims were being tricked to download a fraudulent update that stole their cryptocurrencies. Later on, the threat actors launched a series of <a rel=\"noreferrer noopener\" aria-label=\"Distributed Denial of Service (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/03\/ddos-attacks-are-growing-what-can-businesses-do\/\" target=\"_blank\">Distributed Denial of Service<\/a> (DDoS) attacks in response to Electrum developers trying to protect their users.<\/p>\n<p>Since our last <a rel=\"noreferrer noopener\" aria-label=\"blog (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/\" target=\"_blank\">blog<\/a>, the amount of stolen funds has increased to USD $4.6 million, and the botnet that is flooding the Electrum infrastructure is rapidly growing. Case in point, on April 24, the number of infected machines in the botnet was <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1-1.png\" target=\"_blank\" data-rel=\"lightbox-0\" title=\"\">just below 100,000<\/a> and the next day it reached its <a rel=\"noreferrer noopener\" aria-label=\"highest at 152K (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2-1.png\" target=\"_blank\" data-rel=\"lightbox-1\" title=\"\">highest at 152,000<\/a>, according to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/hodlister.co\/electrum-client-blacklist\" target=\"_blank\">this online tracker<\/a>. Since then, it has gone up and down and plateaued at around the 100,000 mark.<\/p>\n<h3>New loader identified <\/h3>\n<p>We have been able to correlate two distribution campaigns (RIG exploit kit and Smoke Loader) that are fueling this botnet by dropping malware we detect as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-electrumdosminer\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ElectrumDoSMiner (opens in a new tab)\">ElectrumDoSMiner<\/a>. Now, we have just identified a previously undocumented loader we call <a rel=\"noreferrer noopener\" aria-label=\"Trojan.BeamWinHTTP (opens in a new tab)\" href=\"https:\/\/twitter.com\/siri_urz\/status\/1122104376586326016\" target=\"_blank\">Trojan.BeamWinHTTP<\/a> that is also involved in downloading ElectrumDoSMiner (<em>transactionservices.exe<\/em>).<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38416\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/attachment\/beam_http_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_.png\" data-orig-size=\"1051,716\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"beam_http_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_-300x204.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_-600x409.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_.png\" alt=\"\" class=\"wp-image-38416\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_.png 1051w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_-300x204.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/beam_http_-600x409.png 600w\" sizes=\"(max-width: 1051px) 100vw, 1051px\" \/><\/a><figcaption>New Trojan.BeamWinHTTP connected to ElectrumDoSMiner<\/figcaption><\/figure>\n<\/div>\n<p>As can be seen in the VirusTotal graphs above and below, there are hundreds of malicious binaries that retrieve the ElectrumDoSMiner. We surmise there are probably many more infection vectors beyond the three we&#8217;ve uncovered so far.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38417\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/attachment\/all_ips_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_.png\" data-orig-size=\"985,662\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"all_IPs_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_-300x202.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_-600x403.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_.png\" alt=\"\" class=\"wp-image-38417\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_.png 985w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_-300x202.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/all_IPs_-600x403.png 600w\" sizes=\"(max-width: 985px) 100vw, 985px\" \/><\/a><figcaption>The main infrastructure hosting ElectrumDoSMiner binaries and configuration files<\/figcaption><\/figure>\n<\/div>\n<h3>Botnet geographic distribution<\/h3>\n<p>By analyzing the IP addresses and mapping them to a country, we are able to have a better idea of where the bots are located. We find the largest concentration in the Asia Pacific region (APAC). For the Americas, most bots are located in Brazil and Peru.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38414\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/attachment\/map_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_.png\" data-orig-size=\"686,422\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"map_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_-300x185.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_-600x369.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_.png\" alt=\"\" class=\"wp-image-38414\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_.png 686w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_-300x185.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/map_-600x369.png 600w\" sizes=\"(max-width: 686px) 100vw, 686px\" \/><\/a><figcaption>World map showing presence of bots part of the Electrum DDoS botnet<\/figcaption><\/figure>\n<\/div>\n<p>The number of victims that are part of this botnet is constantly changing. We believe as some machines get cleaned up, new ones are getting infected and joining the others to perform DoS attacks. <a href=\"https:\/\/www.malwarebytes.com\/\">Malwarebytes<\/a> detects and removes ElectrumDoSMiner infections on more than 2,000 endpoints daily.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/stats.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"38415\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/attachment\/stats-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/stats.png\" data-orig-size=\"498,255\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"stats\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/stats-300x154.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/stats.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/stats.png\" alt=\"\" class=\"wp-image-38415\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/stats.png 498w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/stats-300x154.png 300w\" sizes=\"(max-width: 498px) 100vw, 498px\" \/><\/a><figcaption>Number of ElectrumDoSMiner infected machines cleaned by Malwarebytes<\/figcaption><\/figure>\n<\/div>\n<h3>An underreported and yet massively fraudulent scheme<\/h3>\n<p>Crooks wasted no time in exploiting a vulnerability in Electrum wallets to phish unsuspecting users. What followed next with retribution attacks on Electrum servers was unexpected but logical, considering what is at stake.<\/p>\n<p>While these DDoS attacks have not been publicized much by mainstream media, they have undoubtedly caused millions of dollars in losses over the span of just a few months.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p>ElectrumDoSMiner infrastructure<\/p>\n<pre class=\"wp-block-preformatted\">178.159.37.113  <br \/>194.63.143.226  <br \/>217.147.169.179<br \/>188.214.135.174<\/pre>\n<p>Trojan.BeamWinHTTP<\/p>\n<pre class=\"wp-block-preformatted\">48dcb183ff97a05fd3e466f76f385543480abb62c9adcae24d1bdbbfc26f9e5a<\/pre>\n<p>Hashes for the binaries tied to the ElectrumDoSMiner infrastructure can be downloaded <a href=\"https:\/\/pastebin.com\/raw\/WEKTkyhK\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"here (opens in a new tab)\">here<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/\">Electrum DDoS botnet reaches 152,000 infected hosts<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 29 Apr 2019 17:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/' title='Electrum DDoS botnet reaches 152,000 infected hosts'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_1114793429.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We&#8217;ve identified a new piece of malware that is connected to the Electrum botnet.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/electrum\/\" rel=\"tag\">Electrum<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/electrumdosminer\/\" rel=\"tag\">ElectrumDoSMiner<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-beamwinhttp\/\" rel=\"tag\">Trojan.BeamWinHTTP<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/' title='Electrum DDoS botnet reaches 152,000 infected hosts'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-ddos-botnet-reaches-152000-infected-hosts\/\">Electrum DDoS botnet reaches 152,000 infected hosts<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,4503,21568,21666,21667],"class_list":["post-15210","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-cybercrime","tag-electrum","tag-electrumdosminer","tag-trojan-beamwinhttp"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15210"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15210\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15210"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}