HolesWarm Botnet in Action
A new botnet named HolesWarm has been slowly growing in the shadow exploiting more than 20 known vulnerabilities to break into Windows and Linux servers and then deploy cryptocurrency-mining malware.
While attacks have primarily been spotted across China, the botnet is expected to expand its reach, and target systems across the globe as its infrastructure and attack capabilities expand in the coming months.
Primarily operated from a command and control server located at m[.]windowsupdatesupport[.]org, the botnet has been seen exploiting vulnerabilities in software such as:
- Apache Tomcat
- Apache Struts (multiple bugs)
- Apache Shiro
- Apache Hadoop Yarn
- Oracle WebLogic (CVE-2020-14882)
- Spring Boot
- Zhiyuan OA (multiple bugs)
- Panwei OA
- Yonyou GRP-U8
The entry vectors may vary per victim, once the malware gets a foothold on an infected system, HolesWarm dumps local passwords, expands to the local network, and then deploys an XMRig-based cryptocurrency mining tool.
Other botnet operators try to hide their presence on infected systems by tethering the crypto-mining process, HolesWarm doesn’t appear to employ this safety mechanism, and per several reports, the botnet often maxs out server CPUs, leading to its discovery.
This botnet is just the latest in a long line of crypto-mining botnets that are popping up online on a regular basis. Nothing in its make-up screams technical sophistication, and the HolesWarm operators are just the latest malware coders taking advantage of the large number of servers running out-of-date software.
2 thoughts on “HolesWarm Botnet in Action”
Reblogged this on Muunyayo and commented:
#BotNet #HolesWorm #Linux #Apache #Oracle #Windows #crypto #mining