Tuesday, April 15, 2025
HomeCyber AttackNew Malware Strikes 4,000+ ISPs, Enabling Hacker Remote Access

New Malware Strikes 4,000+ ISPs, Enabling Hacker Remote Access

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered malware campaign has compromised over 4,000 Internet Service Providers (ISPs) across the West Coast of the United States and China, granting hackers remote access to critical infrastructure.

The campaign, identified by the Splunk Threat Research Team, is believed to originate from Eastern Europe and employs a combination of brute-force attacks, cryptomining payloads, and advanced evasion techniques.

Attack Overview

The malware capitalizes on weak credentials to infiltrate ISP systems using brute-force methods.

- Advertisement - Google News

Once inside, attackers deploy a range of malicious binaries such as mig.rdp.exe, x64.exe, and migrate.exe to execute cryptomining operations and steal sensitive information.

These payloads are capable of disabling security features, exfiltrating data via Command and Control (C2) servers (including Telegram bots), and pivoting to other targets within the compromised network.

The malware primarily exploits Windows Remote Management (WINRM) services for lateral movement.

It uses encoded PowerShell scripts to disable antivirus protections, terminate competing cryptominers, and establish persistence on infected systems.

Additionally, it modifies directory permissions to restrict user access and ensure its files remain undetected.

Remote Access
Enable Inheritance Permission of a Directory

Technical Details

The campaign employs self-extracting RAR archives (SFX) to simplify deployment.

For instance, the mig.rdp.exe payload drops multiple files including batch scripts (ru.bat, st.bat) and executables (migrate.exe) which disable Windows Defender’s real-time monitoring and add malicious exceptions to avoid detection.

Another component, MicrosoftPrt.exe, functions as a clipboard hijacker targeting cryptocurrency wallet addresses for Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC), and others.

The malware also uses mass scanning tools, like masscan.exe to identify vulnerable IP ranges within ISP infrastructure.

Once identified, it leverages SSH or WINRM protocols to gain further access.

Remote Access
SSH Connection Credentials

The attackers utilize Python-compiled executables for automation, minimizing their operational footprint while maintaining high efficiency in restricted environments.

Artifacts such as Superfetch.exe (an XMRig cryptominer), IntelConfigService.exe (an AutoIt script for defense evasion), and MicrosoftPrt.exe have been flagged by researchers.

These files are often hidden in unconventional directories like C:\Windows\Tasks\ or C:\ProgramData\.

The malware also manipulates registry keys to disable Remote Desktop Protocol (RDP) services and log off active users to hinder remediation efforts.

This campaign highlights the growing sophistication of malware targeting critical infrastructure providers.

By combining cryptomining with credential theft and advanced persistence mechanisms, the attackers aim to maximize resource exploitation while evading detection.

The use of Telegram bots as C2 servers further complicates traditional network monitoring efforts.

Splunk has released a set of detection rules to help organizations identify suspicious activity linked to this campaign.

These include alerts for unusual file paths, WINRM-based PowerShell executions, and DNS queries associated with Telegram APIs.

As ISPs remain a critical backbone of digital connectivity, this attack underscores the urgent need for robust cybersecurity measures.

Organizations are advised to enforce strong password policies, monitor endpoint activity closely, and deploy advanced threat detection tools to mitigate risks associated with such sophisticated campaigns.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...