New Cryptojacking Malware is Targeting Linux Servers
- The malware uses XMRig 2.13.1 to mine Monero.

Researchers discovered a new cryptocurrency mining malware that is targeting vulnerable computers to mine Monero (XMR).
Dubbed as GoLang, the malware is written in the Go programing language and targets vulnerable Linux-based servers.
In the last few weeks, multiple cybersecurity research groups reported about the malware and, according to the researchers at Trend Micro, the malware not only targets a vulnerable server but also tries to propagate in the entire network.
Many ways to target a system
Another research group, F5, detailed that the malware spreads through seven methods in a network - four methods involve targeting the server-level programming languages, while others involve the misconfigured credentials in the SSH or Redis database.
The researchers also detailed that the malicious code first sends a GET request to ident.me, a service that finds public IP addresses, and then the list of IPs are searched to find open ports 80, 20, 8090, and 6397. If any open port is found in a server, the malware sends a request to download a payload hosted on Pastebin.
To mine the digital currency, GoLang uses a well-known Monero mining script called XMRig 2.13.1.
To hide the propagation or presence of the malware, the malicious code even disables security tools and software and deletes history and logs in the compromised machine. Moreover, it also kills any ongoing Crypto Mining Crypto Mining Cryptocurrency mining is defined as the process through which the transactions of a digital currency are authenticated then published to blockchain. For every crypto transaction conducted, a crypto miner is in charge of authenticating the information which, if approved, is then updated in the blockchain. Currently, the most popular cryptocurrencies being mined are Bitcoin, Litecoin, Ethereum Classic, Monero, and DASH. How is Cryptocurrency Mined?The process of crypto mining itself involves the s Cryptocurrency mining is defined as the process through which the transactions of a digital currency are authenticated then published to blockchain. For every crypto transaction conducted, a crypto miner is in charge of authenticating the information which, if approved, is then updated in the blockchain. Currently, the most popular cryptocurrencies being mined are Bitcoin, Litecoin, Ethereum Classic, Monero, and DASH. How is Cryptocurrency Mined?The process of crypto mining itself involves the s Read this Term operation in the system to utilize maximum CPU space. It also kills any processes using more than 30 percent of the memory resource.
The cybercriminals even successfully injected the malware in a few mining pools and, according to F5 researchers, they earned less than $2,000 worth of crypto to date from the pools. However, the estimation is based on specific sample wallet addresses owned by the miners.
Cryptojacking Cryptojacking Cryptojacking is defined as the unauthorized use of an individual’s computer to mine cryptocurrency. Hackers accomplish this feat by through several means.This includes obtaining access via malicious links in an email that loads crypto mining code on the computer, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser.Consequently, this crypto mining code is able to work out of sight of unsuspecting victims, often without notice. The on Cryptojacking is defined as the unauthorized use of an individual’s computer to mine cryptocurrency. Hackers accomplish this feat by through several means.This includes obtaining access via malicious links in an email that loads crypto mining code on the computer, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser.Consequently, this crypto mining code is able to work out of sight of unsuspecting victims, often without notice. The on Read this Term has always been a lucrative thing for cybercriminals. Many popular websites were also found to inject mining scripts in visitors computers to mine cryptocurrency without their consent.
Earlier, Finance Magnates reported that an infamous crypto-mining malware, Shellbot, was updated by its developers to shut all crypto mining services on the infected computer to squeeze all the processing power.
Researchers discovered a new cryptocurrency mining malware that is targeting vulnerable computers to mine Monero (XMR).
Dubbed as GoLang, the malware is written in the Go programing language and targets vulnerable Linux-based servers.
In the last few weeks, multiple cybersecurity research groups reported about the malware and, according to the researchers at Trend Micro, the malware not only targets a vulnerable server but also tries to propagate in the entire network.
Many ways to target a system
Another research group, F5, detailed that the malware spreads through seven methods in a network - four methods involve targeting the server-level programming languages, while others involve the misconfigured credentials in the SSH or Redis database.
The researchers also detailed that the malicious code first sends a GET request to ident.me, a service that finds public IP addresses, and then the list of IPs are searched to find open ports 80, 20, 8090, and 6397. If any open port is found in a server, the malware sends a request to download a payload hosted on Pastebin.
To mine the digital currency, GoLang uses a well-known Monero mining script called XMRig 2.13.1.
To hide the propagation or presence of the malware, the malicious code even disables security tools and software and deletes history and logs in the compromised machine. Moreover, it also kills any ongoing Crypto Mining Crypto Mining Cryptocurrency mining is defined as the process through which the transactions of a digital currency are authenticated then published to blockchain. For every crypto transaction conducted, a crypto miner is in charge of authenticating the information which, if approved, is then updated in the blockchain. Currently, the most popular cryptocurrencies being mined are Bitcoin, Litecoin, Ethereum Classic, Monero, and DASH. How is Cryptocurrency Mined?The process of crypto mining itself involves the s Cryptocurrency mining is defined as the process through which the transactions of a digital currency are authenticated then published to blockchain. For every crypto transaction conducted, a crypto miner is in charge of authenticating the information which, if approved, is then updated in the blockchain. Currently, the most popular cryptocurrencies being mined are Bitcoin, Litecoin, Ethereum Classic, Monero, and DASH. How is Cryptocurrency Mined?The process of crypto mining itself involves the s Read this Term operation in the system to utilize maximum CPU space. It also kills any processes using more than 30 percent of the memory resource.
The cybercriminals even successfully injected the malware in a few mining pools and, according to F5 researchers, they earned less than $2,000 worth of crypto to date from the pools. However, the estimation is based on specific sample wallet addresses owned by the miners.
Cryptojacking Cryptojacking Cryptojacking is defined as the unauthorized use of an individual’s computer to mine cryptocurrency. Hackers accomplish this feat by through several means.This includes obtaining access via malicious links in an email that loads crypto mining code on the computer, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser.Consequently, this crypto mining code is able to work out of sight of unsuspecting victims, often without notice. The on Cryptojacking is defined as the unauthorized use of an individual’s computer to mine cryptocurrency. Hackers accomplish this feat by through several means.This includes obtaining access via malicious links in an email that loads crypto mining code on the computer, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser.Consequently, this crypto mining code is able to work out of sight of unsuspecting victims, often without notice. The on Read this Term has always been a lucrative thing for cybercriminals. Many popular websites were also found to inject mining scripts in visitors computers to mine cryptocurrency without their consent.
Earlier, Finance Magnates reported that an infamous crypto-mining malware, Shellbot, was updated by its developers to shut all crypto mining services on the infected computer to squeeze all the processing power.