Tuesday, March 4, 2025
HomeCyber AttackNew Malware Strikes 4,000+ ISPs, Enabling Hacker Remote Access

New Malware Strikes 4,000+ ISPs, Enabling Hacker Remote Access

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered malware campaign has compromised over 4,000 Internet Service Providers (ISPs) across the West Coast of the United States and China, granting hackers remote access to critical infrastructure.

The campaign, identified by the Splunk Threat Research Team, is believed to originate from Eastern Europe and employs a combination of brute-force attacks, cryptomining payloads, and advanced evasion techniques.

Attack Overview

The malware capitalizes on weak credentials to infiltrate ISP systems using brute-force methods.

Once inside, attackers deploy a range of malicious binaries such as mig.rdp.exe, x64.exe, and migrate.exe to execute cryptomining operations and steal sensitive information.

These payloads are capable of disabling security features, exfiltrating data via Command and Control (C2) servers (including Telegram bots), and pivoting to other targets within the compromised network.

The malware primarily exploits Windows Remote Management (WINRM) services for lateral movement.

It uses encoded PowerShell scripts to disable antivirus protections, terminate competing cryptominers, and establish persistence on infected systems.

Additionally, it modifies directory permissions to restrict user access and ensure its files remain undetected.

Remote Access
Enable Inheritance Permission of a Directory

Technical Details

The campaign employs self-extracting RAR archives (SFX) to simplify deployment.

For instance, the mig.rdp.exe payload drops multiple files including batch scripts (ru.bat, st.bat) and executables (migrate.exe) which disable Windows Defender’s real-time monitoring and add malicious exceptions to avoid detection.

Another component, MicrosoftPrt.exe, functions as a clipboard hijacker targeting cryptocurrency wallet addresses for Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC), and others.

The malware also uses mass scanning tools, like masscan.exe to identify vulnerable IP ranges within ISP infrastructure.

Once identified, it leverages SSH or WINRM protocols to gain further access.

Remote Access
SSH Connection Credentials

The attackers utilize Python-compiled executables for automation, minimizing their operational footprint while maintaining high efficiency in restricted environments.

Artifacts such as Superfetch.exe (an XMRig cryptominer), IntelConfigService.exe (an AutoIt script for defense evasion), and MicrosoftPrt.exe have been flagged by researchers.

These files are often hidden in unconventional directories like C:\Windows\Tasks\ or C:\ProgramData\.

The malware also manipulates registry keys to disable Remote Desktop Protocol (RDP) services and log off active users to hinder remediation efforts.

This campaign highlights the growing sophistication of malware targeting critical infrastructure providers.

By combining cryptomining with credential theft and advanced persistence mechanisms, the attackers aim to maximize resource exploitation while evading detection.

The use of Telegram bots as C2 servers further complicates traditional network monitoring efforts.

Splunk has released a set of detection rules to help organizations identify suspicious activity linked to this campaign.

These include alerts for unusual file paths, WINRM-based PowerShell executions, and DNS queries associated with Telegram APIs.

As ISPs remain a critical backbone of digital connectivity, this attack underscores the urgent need for robust cybersecurity measures.

Organizations are advised to enforce strong password policies, monitor endpoint activity closely, and deploy advanced threat detection tools to mitigate risks associated with such sophisticated campaigns.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...