Categories: Cryptocurrency hack

Rarog Cryptomining Trojan Connecting to 161 Different Command and Control (C2) Servers & Compromise 166,000 Victims

Newly discovered Rarog Cryptomining Trojan Mining Monero cryptocurrency and infected around 166,000 victims around the world that keep spreading by using various methods.

Rarog Trojan sold on the various underground forum since June 2017 and countless cybercriminals were used to compromise many victims.

Its primary target is to mine monero cryptocurrency but it also capable of mining other cryptocurrencies as well. Researchers discovered 2,500 unique samples, connecting to 161 different commands and control (C2) servers.

This Cryptomining Trojan distributing with various interesting futures such as f features, including providing mining statistics to users, configuring various processor loads for the running miner, the ability to infect USB devices, and the ability to load additional DLLs on the victim.

Most of the infected countries are Philippines, Russia, and Indonesia and this Mining Trojan used by various cyber criminals and each criminal earned up to the US $120.

Also Read: New Android Remote Access Trojan(RAT) Steals Photos, Contacts, SMS & Recording Phone Calls

Underground Russian Forum

Since 2017 it distributed various Russian underground site and this Cryptomining Trojan  selling the price US $104.

Also, Buyers can have a chance to do a “test drive” by accessing the guest administration panel with the user interface the Trojan.

Also, there are two Twitter handles shown in the administration panel and the both have posted various s postings for this malware family,.

Rarog Cryptomining Trojan Family Distribution

This Cryptomining Trojan using the variously advanced techniques to avoid detection and uses multiple mechanisms to maintain persistence.

There are two main ways it using to infect the victims to mining the monero and download other Cryptomining Trojan.

An installation routine phase once it entered into the victim machine it, communicate with its command & control server to download the necessary files.

Runtime phase helps to perform its persistence mechanism and Monero mining operation also it employs a number of botnet techniques.

According to Palo Alto Networks, downloading and executing other malware, levying DDoS attacks against others, and updating the Trojan, to name a few. Throughout the malware’s execution, a number of HTTP requests are made to a remote C2 server.

The Rarog malware family represents a continued trend toward the use of cryptocurrency miners and their demand on the criminal underground. While not incredibly sophisticated, Rarog provides an easy entry for many criminals into running a cryptocurrency mining botnet. Researchers said.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

1 day ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

1 day ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

1 day ago

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM) and…

1 day ago

Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials

A surge in phishing text messages claiming unpaid tolls has been linked to a massive…

1 day ago

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

The State Bar of Texas has confirmed a data breach following the detection of unauthorized…

1 day ago