Prometei is a cryptojacking botnet with capability of stealing data and mining Monero cryptominer
Cryptojacking botnet Prometei was recently found to attack users and steal data from them.
The botnet can spread in multiple ways, such as using the Windows Server Message Block protocol (SMB) exploits, stolen credentials, WMI, and PsExec. It contains a payload added specifically to mine for Monero cryptocurrency, while it can also take data from the victim’s device.
Prometei mainly targets the SMB protocol to spread through the networks and systems. The botnet uses brute-force attack on the targeted system to steal credentials and sensitive data. The stolen passwords are shared to a CnC server by the botnet in order to verify the stolen data.
The botnet also mines for Monero cryptominer and uses various other tools to increase the number of systems participating in cryptomining attack. Prometei also uses 15 executable modules for obtaining the administrator password from the targeted computer.
When the malware manages to obtain access to the infected machine’s administrative rights, it starts stealing all the data stored on the device. The botnet can contain as many as 10,000 systems simultaneously and can steal from all of them.
NPAV recommends users to keep your cyber security measures updated and your guard up. Install NPAV in your devices to protect your system and networks from these attacks. NPAV offers best in class defence against all kinds of cyber attacks.
Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (123)
- Events and News (26)
- Features (44)
- Security (422)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)