During the investigation of one of the attacks, a cybersecurity company Tehtris found about a cryptojacking campaign dubbed 'Color1337' where a threat actor targeted Linux machines using a bot called "uhQCCSpB" which installs and executes 'Monero' miners on compromised machines. According to researchers, they don't know how the attackers gain initial access but assume that they brute force SSH credentials and download and execute a shell script named uhQCCSpB on an infected machine which performs cryptojacking, as well as infects other machines using crypto-miner Monero. Also, the uhQCCSpB is used by attackers to send and execute commands on an infected device and with this a payload bash script is launched which, upon execution, first performs the killing of all the other miners present on the machine and makes sure all the space is clear. In the next step, the script checks for the number of cores the machine uses, if it is more than 4, then the “FastAndSteady” approach in which the cryptominer 'diicot' is downloaded. Similarly, if infected machine has a less than 4 core, then the “SlowAndSteady” approach in which threat actor downloads an executable with name 'Update' and also executes 'History' executable from the C2 server 'arhivehaceru[.]com', and use the machine as rebound to infect other hosts. In addition, the threat actors try to change the password for their current account and hardcoded ones for the infected machine with the aim of preventing other attackers taking control of these machines using the same brute-force technique. Furthermore, since the Romanian language used in the payload bash script, researchers believe that the threat actors are originated from Romania, who referred themselves as “ElPatrono1337”, where 1337 represents the recurrent value in attacks, which is also the port number through which the threat actor retrieves the stolen data from compromised device also the colour chosen as a parameter for the discord webhooks. Additionally, Tehtris observed discord’s webhooks feature being used by attackers to store exfiltrated data as well as for receiving POST requests from the compromised machines.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...