{"id":198053,"date":"2017-06-11T16:52:30","date_gmt":"2017-06-11T20:52:30","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/linux-worm-turns-raspberry-pis-into-cryptocurrency-mining-bots-boing-boing\/"},"modified":"2017-06-11T16:52:30","modified_gmt":"2017-06-11T20:52:30","slug":"linux-worm-turns-raspberry-pis-into-cryptocurrency-mining-bots-boing-boing","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/linux-worm-turns-raspberry-pis-into-cryptocurrency-mining-bots-boing-boing\/","title":{"rendered":"Linux worm turns Raspberry Pis into cryptocurrency mining bots &#8211; Boing Boing"},"content":{"rendered":"<p><p>    Linux.MulDrop.14 is a Linux worm that seeks    out networked Raspberry Pi systems with default root passwords;    after taking them over and ZMap and sshpass, it begins mining    an unspecified cryptocurrency, creating riches for the    malware's author and handing you the power-bill.  <\/p>\n<p>      Experts say the initial infection takes place when Raspberry      Pi operators leave their devices' SSH ports open to external      connections.    <\/p>\n<p>      Once a Raspberry Pi device is infected, the malware changes      the password for the \"pi\" account to:    <\/p>\n<p>      $6$U1Nu9qCp$FhPuo8s5PsQlH6lwUdTwFcAUPNzmr0pWCdNJj.p6l4Mzi8S867YLmc7BspmEH95POvxPQ3PzP029yT1L3yi6K1    <\/p>\n<p>      After this, Linux.MulDrop.14 shuts down several processes and      installs libraries required for its operation, including ZMap      and sshpass.    <\/p>\n<p>      The malware then launches its cryptocurrency mining process      and uses ZMap to continuously scan the Internet for other      devices with an open SSH port.    <\/p>\n<p>      Once it finds one, the malware uses sshpass to attempt to log      in using the username \"pi\" and the password \"raspberry.\" Only      this user\/password combo is used, meaning the malware only      targets Raspberry Pi single-board computers.    <\/p>\n<p>        Linux Malware Mines for Cryptocurrency Using Raspberry Pi    Devices [Catalin Cimpanu\/Bleeping Computer]  <\/p>\n<p>    (Image:     Evan-Amos, PD)  <\/p>\n<p>    report this ad  <\/p>\n<p>      Pity poor Turla, the advanced persistent threat hacking group      closely associated with the Russian government who were outed      yesterday for their extremely clever gimmick of using Britney      Spearss Instagram account as a covert channel for      controlling compromised computers in the field while      protecting their command and control servers; today, Turla      faces another devastating disclosure, a []    <\/p>\n<p>      The independent, Congressionally mandated Health Care      Industry Cybersecurity Task Force released its report last      week, setting out their findings about the state of security      in Americas health technology (very, very, very bad) and      their recommendations (basic commonsense cybersecurity 101).    <\/p>\n<p>      A key weakness in malicious software is the Command and      Control (C&C) system: a central server that the      malware-infected systems contact to receive updates and      instructions, and to send stolen data. Anti-malware      researchers like to reverse engineer malicious code, discover      the C&C servers address, and then shut it down or      blacklist it from corporate routers.    <\/p>\n<p>      If Apples AirPods are a bit too rich for your blood, or you      know, youre an Android user, these discreet earbuds can be      had for a fraction of the cost and will stay securely in      place whether youre working out, commuting, or running      between errands. Plus, with IPX4 water resistance, they can      survive splashing water []    <\/p>\n<p>      The QFX Elite Series of wireless speakers can be synced up to      provide a perfect multi-room sound system, and each speaker      (and all three together) are currently available at a      discount price.The Elite Series iscompatible with any      Bluetooth-capable device, and you can connect      eachspeaker over WiFi for a wider reach and greater      signal stability. Pair []    <\/p>\n<p>      In Deception: Murder in Hong Kong, players must solve a      grisly murder through collaborative deduction. One person      plays the role of the killer, who carefully chooses what kind      of evidence they leave at the scene of the crime. The killer      tries to sabotage the investigation, while the forensic      scientist attempts to reveal him or her []    <\/p>\n<p>    report this ad  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/boingboing.net\/2017\/06\/11\/mzi8s867ylmc7bspmeh95povxpq3pz.html\" title=\"Linux worm turns Raspberry Pis into cryptocurrency mining bots - Boing Boing\">Linux worm turns Raspberry Pis into cryptocurrency mining bots - Boing Boing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Linux.MulDrop.14 is a Linux worm that seeks out networked Raspberry Pi systems with default root passwords; after taking them over and ZMap and sshpass, it begins mining an unspecified cryptocurrency, creating riches for the malware's author and handing you the power-bill. Experts say the initial infection takes place when Raspberry Pi operators leave their devices' SSH ports open to external connections <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/linux-worm-turns-raspberry-pis-into-cryptocurrency-mining-bots-boing-boing\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-198053","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198053"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=198053"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/198053\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=198053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=198053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=198053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}