Network Security, Threat Intelligence

Updated Gafgyt botnet exploits GPU for cryptomining

Share
botnet computer virus red background

Machines with unsecured SSH passwords have been brute-forced by a novel variant of the Gafgyt botnet, also known as Torlus, BASHLITE, and Lizkebab, to facilitate cryptomining with the XMRig malware and the impacted devices' GPU computational capabilities, according to The Hacker News.

Malicious payloads delivered following the brute-force attacks enabled XMRig deployment via "systemd-net" and the termination of other malware, as well as the execution of the Id-musl-x86 SSH scanner to facilitate malware spread, an analysis from Aqua Security showed. Further indication of the exploitation of targeted devices' GPU capabilities was the execution of the cryptocurrency mining malware with the --cuda and --opencl flags, the report said. "...[C]ombined with the fact that the threat actor's primary impact is cryptomining rather than DDoS attacks supports our claim that this variant differs from previous ones. It is aimed at targeting cloud-native environments with strong CPU and GPU capabilities," said Aqua Security researcher Assaf Morag.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.