Meet Panda, an illicit cryptocurrency mining crew terrorizing organizations worldwide – The Next Web

Cybersecurity researchers have profiled a hacking crew named Panda believed to have amassed roughly $90,000 worth of cryptocurrency via remote access tools (RATs) and illicit mining malware.

The Cisco Talos Intelligence Group noted that while Panda isnt exactly sophisticated, it has persisted as one of the internets most active attackers in recent years.

Talos researchers highlightedthe groups willingness to continuously exploit vulnerable web applications worldwide as key to its success. By October last year, a configuration file featured in Panda malware had been downloaded more than 300,000 times.

They also frequently update their targeting, using a variety of exploits to target multiple vulnerabilities, and is quick to start exploiting known vulnerabilities shortly after public POCs become available, becoming a menace to anyone slow to patch, said the firm.

Pandawas first detected in mid-2018 during the wildly successful MassMiner campaign. This was powered by aworm which leveraged multiple in-built exploits, and even brute-forced access to Microsoft SQL servers, to mine the alternative cryptocurrency Monero (XMR).

Now, Panda reportedly utilizes Mimikatz, an open-source program for stealing sensitive information from compromised systems, such as usernames and passwords.

Researchers also found Panda operates with exploits previously used by Shadow Brokers, a hacking crew that gained its reputation by publishing information taken from the US National Security Agency.

To date, Talos has confirmed that Panda has hit organizations in the banking, transportation, telecommunications, IT services, and healthcare industries.

Whoever is behindPandadoesnt really caretoo much about operational security. For example, the group got its name as one related domain had been registered to a Chinese-speaking actor who went by the name Panda.

An analyzed malware sample also requesteddata using anIP geolocation service which provided the machines IP address and location in Chinese.

Even more curious, Talos analysts found Panda had been exploiting a vulnerability in the ThinkPHP web framework to spread its malware. Researchers report this software is particularly popular in China.

Pandas operational security remains poor, with many of their old and current domains all hosted on the same IP and their TTPs remaining relatively similar throughout campaigns, wrote the firm. The payloads themselves are also not very sophisticated.

Still, Pandas efforts are said generated around 1,215 XMR in profits, which today is worth around $90,000 but the exact amount earned is dependent on when they sold their cryptocurrency.

Thats one prolific hacking panda.

Published September 18, 2019 12:12 UTC

Read more:

Meet Panda, an illicit cryptocurrency mining crew terrorizing organizations worldwide - The Next Web

Related Post

Comments are closed.