Saturday, March 2, 2024

PyCryptoMiner – A New Linux Crypto-miner Botnet Spreading over the SSH Protocol to Mining Monero

Highly Sophisticated Python Script Based Linux Crypto-miner botnet called PyCryptoMiner abusing SSH port and targeting Linux users to mining Monero CryptoCurrency.

Its written in python language which is difficult to detect and this botnet crypto-miner uses over 36,000 domains that is related to scams, gambling, and adult services.

This Crypto miner mainly focusing on mining Monero and till December researchers estimated that it has made approximately US $46,000 mining Monero.

If original command and control server become unreachable then it leverages to receive C&C Server Assignment.

Current crypto mining malware is mainly using scripts which are very obfuscated, easily evade the detection and also very difficult to detect by nature.

Also Read: Chrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge

How does this Linux Crypto-miner Works

This Crypt-miner botnet using brute forcing attack to guess SHH login credentials of the Linux machine.

Before connected it to command and control server it deploys the base64-encoded spearhead Python script and executing Obfuscated spearhead Python script.

Most of the cases malware hardcoded with the command & control server, so once it’s taken down it won’t be get connected to another C&C server.

But here attacker using as an alternative one if original C&C sever goes down.

According to F5 Networks, Being exposed as a public resource allowed us also to discover more information about this operation. It seems to have been running since at least August of this year because the username “WHATHAPPEN” created the resource on Aug. 21, 2017.

This resource is continuously accessing when original C&C Server goes down and this resource had been viewed 177,987 times.

Its execution flow starts by executing the spearhead Python script it leads to fetching base64-encoded Python script and executed from the C&C server.

It will be the main controller of the of the infected machine which is act as a botnet and The original spearhead bash script named httpsd includes a base64-encoded Python one-liner that runs every 6 hours.

its used to collect  Host/DNS name, OS name and its architecture, Number of CPUs, CPU usage once its take over the target machine.

Discovered  2 pool address which is used by this botnet were paid approximately 94 and 64 Monero which is around  $60,000 USD.







hxxp:// (

hxxp:// (




Infected Machine










Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles