Botnet Infects Half a Million Servers to Mine Thousands of Monero

A cryptocurrency miner botnet has infected more than half a million machines, hijacking them to mine as much as $3.6 million worth of monero.

AccessTimeIconFeb 2, 2018 at 6:46 p.m. UTC
Updated Aug 18, 2021 at 8:06 p.m. UTC

Presented By Icon

Election 2024 coverage presented by

Stand with crypto

More than half a million machines have been hijacked by a cryptocurrency miner botnet, forcing them to mine nearly 9,000 monero tokens (worth roughly $3.6 million), according to a new report.

The Smominru botnet, which infected more than 526,000 Windows servers at its peak, has been used to mine 8,900 monero tokens since it first started appearing in May 2017, according to ZDNet. The botnet is based on the Windows exploit EternalBlue, which was developed by the U.S. National Security Agency and leaked by the Shadow Brokers hacker group last year. Eternal Blue was subsequently deployed in conjunction with another NSA-developed exploit, DoublePulsar, in the WannaCry attack.

  • Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
    13:18
    Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
  • Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
    05:10
    Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
  • The first video of the year 2024
    04:07
    The first video of the year 2024
  • The last regression video of the year 3.67.0
    40:07
    The last regression video of the year 3.67.0
  • Windows servers have been the botnet's primary victims, which ZDNet notes are ideal hosts because they are always turned on and have more processing capacity than a personal computer. The majority of affected machines are reportedly located in Russia, India and Taiwan, though the attack spans the globe.

    Attempts to curtail the botnet have had only short-term success thus far.  Cybersecurity workers from Proofpoint, abuse.ch and the ShadowServer Foundation attempted to eradicate the botnet using a technique called "sinkholing," but the Smominru quickly recovered.

    As CoinDesk has previously reported, monero has increasingly been implicated with cybercrime, likely because transactions, the coins used in transactions and transaction histories associated with monero are all private.

    , the previously mentioned exploit, DoublePulsar, was used to facilitate the secret installation of monero mining malware. Likewise,  earlier this week, security firm TrendMicro announced its discovery that miners have been appropriating Google's DoubleClick ad services to distribute malware to mine the cryptocurrency.

    Disclosure

    Please note that our privacy policy, terms of use, cookies, and do not sell my personal information have been updated.

    CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. CoinDesk has adopted a set of principles aimed at ensuring the integrity, editorial independence and freedom from bias of its publications. CoinDesk is part of the Bullish group, which owns and invests in digital asset businesses and digital assets. CoinDesk employees, including journalists, may receive Bullish group equity-based compensation. Bullish was incubated by technology investor Block.one.


    Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.