Crypto Mining Attacks on Cyber Security: Xmrig Is a Sophisticated Crypto Miner

Crypto Mining Attacks on Cyber Security: Xmrig Is a Sophisticated Crypto Miner

Ilker Kara, Emre Hasgul
DOI: 10.4018/978-1-6684-6247-8.ch005
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

The increase in popularity of blockchain and cryptocurrencies in the last decade has led cyber attackers to develop various methods. Today, countless blockchain and cryptocurrency system applications and technologies target user accounts and information systems through cryptocurrency hacking malware. Especially with off-the-shelf mining scripts readily available from untraceable cryptocurrencies (e.g., Monero and Zcash), crypto-hacking malware has become an indispensable method for attackers. This study focuses on the mechanism and detection and analysis of crypto miner malicious software attacks. In addition, precautions that can be taken to protect against crypto miner malicious software attacks are presented.
Chapter Preview
Top

Xmrig Attack

Xmrig is a sophisticated and legitimate cryptominer. However, attackers use a trajonized version of it (Lebosse et al., 2017 and Mbiatem et al., 2018). In addition there is a really well thought technique that makes it dangerous (Varlioglu et al., 2022 and Zoghlami et al., 2016 and Taghipour et al., 2013 and Alizadeh et al., 2020 and Gao et al., 2018).

Attackers penetrate a server that has connection to both internet and intranet. However, they do not run this miner on the initially infected server. They remove their traces on it first. For example, in Linux servers, attackers changes the content of following log files with /dev/null.

  • /var/log/security

  • /var/log/wtmp

  • /var/log/btmp

  • /var/log/utx.lastlog

  • /var/log/utx.log

After initial access, the attacker perform brute force attacks to SSH ports of intranet servers that are connected to initially penetrated server. After a successful brute force they have the root access to intranet server and they start to move laterally. Then they install the miner on penetrated intranet servers.

Figure 1.

Tojanized XMRIG Miner Lateral Movement.

978-1-6684-6247-8.ch005.f01

When the attacker successfully installed the miner on servers they deliver their mined coins to the pool server.

Top

Detection

A miner is highly detectable because of its extraordinary CPU usage (Khushali 2020). In contrast to that detection of a miner can be hard (Carlin et al., 2019 and Kumar, 2020 and Afreen et al., 2020). In the figure below we can see the miner in the plain. However, an analyst most probably will see a different picture.

Figure 2.

XMRIG Miner Process.

978-1-6684-6247-8.ch005.f02

The analyst checks the processes of the infected server for any unknown processes. As we see in the figure below, a process hacker or resource hacker can easily manipulate miner process to make the miner invisible to eyes except CPU usage.

Figure 3.

XMRIG Miner Executable Manipulated To Be Seen As Notepad Application.

978-1-6684-6247-8.ch005.f03

A good analyst will check the network connections of the server. However, due to attack technique mentioned below. Miner server will only have intranet connections. Thus, this can be mistakenly assumed a legit network connection.

Figure 4.

Infected Intranet Server Connection

978-1-6684-6247-8.ch005.f04

Complete Chapter List

Search this Book:
Reset