Botnets can change CPU settings to increase mining performance
Not only does it hijack vulnerable *nix-based servers and use them to mine cryptocurrencies, the malware also possesses the ability to interfere with and modify the machine's CPU configuration. owner to increase cryptocurrency mining performance to the optimum level.
According to preliminary investigation results, this is a Golang-based malware strain, which is used to exploit known vulnerabilities such as CVE-2020-14882 (Oracle WebLogic) and CVE-2017-11610 (Supervisord) to access to Linux systems, The Record reports. After hijacking a system, they use specialized model-specific registers (MSRs) to disable the hardware pre-installer, a unit that fetches data and transmits from the controller. into the L2 cache before they are needed.
Prefetch - Resource Prefetch - is a technique that has been used for many years and can help increase performance in various tasks. However, disabling it can increase mining performance in XMRig, the cryptocurrency mining software used by crooks, by 15%.
But disabling the hardware pre-installer will degrade performance in valid applications. In return, server operators will have to purchase additional hardware to meet their performance requirements, or increase the power limit for existing hardware. In either case, it all adds up to power consumption and additional costs.
According to the report, this malicious botnet has been exploited since at least December 2020, and mainly targets vulnerabilities in MySQL, Tomcat, Oracle WebLogic, and Jenkins. This shows that it is flexible enough to attack many different programs. It's not clear how widespread these attacks are right now, but they appear to be widespread enough for security researchers to pay more attention to in the near future.
You should read it
- Microsoft has just taken down a huge botnet network
- Detecting cryptocurrency mining Botnet using photos of Taylor Swift to spread malicious code
- The same Skype ID malware author used to run IoT Botnet and apply for jobs
- How the botnet works
- WireX DDoS Botnet: tens of thousands of Android phones are hacked
- How many types of malware do you know and how to prevent them?
- What is a botnet, who does it use to attack, and how can you prevent botnet?
- Google can detect cryptocurrency mining malware without needing to install software on the user's computer
May be interested
- Leaked benchmark results of AMD Radeon RX 6700M 'Navi 22' laptop GPUthe first information about the benchmark results of the amd radeon rx 6700m rdna 2 laptop gpu model based on navi 22 has just been revealed.
- NBMiner releases 'hack' that can restore 70% of 'mining' performance on NVIDIA's Ampere LHR GPUdetermined to stabilize the dedicated gpu market in the face of the 'crypto mining storm', the world's leading graphics card maker nvidia has launched lite hash rate (lhr) as a solution. limit the 'expansion' of coin miners in the gpu market.
- Revealed Intel Core i9-12900K Alder Lake-S CPU configuration with 16 cores, 24 threads, supports DDR4 RAMrelatively detailed information about intel's high-end core i9-12900k alder lake-s cpu model has just been unexpectedly found in the database of the userbenchmark hardware review site. the chip was found to be running on a high-performance desktop platform, and has an impressive configuration
- Why is the Galaxy Z Flip 3 not equipped with an under-screen camera that the Galaxy Z Fold 3 has?for example, the galaxy z flip 3 is the first samsung smartphone to be equipped with a camera hidden under the screen, while the galaxy z flip 3 is not.
- AMD Radeon RX 6600 XT - the next 'monster' in the world of crypto mining!one of the main reasons for the shortage of supply in the graphics card market over the past several months stems from the explosion in cryptocurrency mining.
- Google adds interactive periodic table of chemistry to search resultsgoogle has just added an interactive periodic table to its search results so you can learn more about the elements. this periodic table will appear when you search for 'periodic table' and click the 'discover the elements' button on the right side of the page.