{"id":13907,"date":"2019-05-03T00:00:00","date_gmt":"2019-05-03T00:00:00","guid":{"rendered":"https:\/\/crypto-economy.com\/2019\/05\/03\/monero-xmr-shellbot-crypto-mining-malware-evolves-now-able-to-shut-down-other-crypto-miners\/"},"modified":"2023-03-13T17:14:22","modified_gmt":"2023-03-13T17:14:22","slug":"monero-xmr-shellbot-crypto-mining-malware-evolves-now-able-to-shut-down-other-crypto-miners","status":"publish","type":"post","link":"https:\/\/crypto-economy.com\/monero-xmr-shellbot-crypto-mining-malware-evolves-now-able-to-shut-down-other-crypto-miners\/","title":{"rendered":"Monero [XMR] \u2013 Shellbot Crypto Mining Malware Evolves; Now Able to Shut Down Other Crypto Miners"},"content":{"rendered":"
Cryptocurrency mining hackers, a new breed of hackers who are mostly motivated by monetary gains, are on the rise. They have grown in terms of their sophisticated attacks using what is popularly known as crypto hacking<\/a><\/strong> techniques to take command of their victims\u2019 computers. <\/p>\n In recent months, a new crypto jacking malware has been raging, its name is Shellbot and was first discovered in 2005. Shellbot is a Trojan malware which has undergone a series of updates to the current iteration<\/strong>. In the latest report by Boston-based security firm Threat Stack<\/strong>, Shellbot has a few detrimental tricks up its \u2018sleeve\u2019.<\/p>\n Shellbot was redesigned to employ the SSH brute force<\/strong> technique to infiltrate Linux-based systems with weak passwords to commandeer the system towards mining the privacy-focused Monero <\/strong>cryptocurrency<\/a>. The latest iteration of the malware has more capabilities including shutting other miners in order to allocate more computing resources towards the hackers\u2019 mining gimmicks.<\/strong> As stated by the authors of the report,<\/p>\n \u201cThe main goal of this campaign appears to be monetary gain via crypto mining and propagating itself to other systems on the internet.\u201d<\/em><\/p>\n With this capability, it seems that the new iteration of the malware is more focused towards attacking miners as opposed to general computing devices. Since miners are more powerful than normal office computing systems, once the malware infects a mining rig, it is able to command more processing power. Furthermore, most mining setups are using Linux-based operating systems that are target operating systems for the malware.<\/p>\n