Blockchain News

Malware ‘Lucifer’ Targets Windows System To Install Mine Monero

A malware, Lucifer, has been warned about by security experts from Palo Alto Networks’ Unit 42. Notably, it is a self-programming malware which launches cryptojacking and DDoS attacks against Windows Systems. 

Studies have further claimed that Lucifer is a hybrid of cryptojacking and DDos malware. It leverages the old qualities on the Windows platform.

Enter vulnerabilities 

The malware breaks security infrastructure to execute commands which release DDoS attacks. It further allows them to install XMRig Miner, which is a popular  Monero (XMR) mining application, to launch cryptojacking attacks.

According to Palo Alto Networks, a related Monero wallet has received 0.493527 XMR so far. That converts to approximately $32 as of press time.

How to prevent the attack

However, according to recent research, there have been ways and recommendations to avoid Lucifer attack. One of the suggestions has said that applying the updates and patches to the affected software are strongly required.

“Applying the updates and patches to the affected software is strongly advised. The vulnerable software includes Rejetto HTTP File Server, Jenkins, Oracle Weblogic, Drupal, Apache Struts, Laravel framework, and Microsoft Windows. Strong passwords are also encouraged to prevent dictionary attacks.”

Multiple media reports claim that a group of hackers behind the Kingminer botnet targeted vulnerable Microsoft SQL server databases to mine Monereo in June.

Crypto products and NFTs are unregulated and can be highly risky. There may be no regulatory recourse for any loss from such transactions. Crypto is not a legal tender and is subject to market risks. Readers are advised to seek expert advice and read offer document(s) along with related important literature on the subject carefully before making any kind of investment whatsoever. Crypto market predictions are speculative and any investment made shall be at the sole cost and risk of the readers.