Botnets can change CPU settings to increase mining performance
Not only does it hijack vulnerable *nix-based servers and use them to mine cryptocurrencies, the malware also possesses the ability to interfere with and modify the machine's CPU configuration. owner to increase cryptocurrency mining performance to the optimum level.
According to preliminary investigation results, this is a Golang-based malware strain, which is used to exploit known vulnerabilities such as CVE-2020-14882 (Oracle WebLogic) and CVE-2017-11610 (Supervisord) to access to Linux systems, The Record reports. After hijacking a system, they use specialized model-specific registers (MSRs) to disable the hardware pre-installer, a unit that fetches data and transmits from the controller. into the L2 cache before they are needed.
Prefetch - Resource Prefetch - is a technique that has been used for many years and can help increase performance in various tasks. However, disabling it can increase mining performance in XMRig, the cryptocurrency mining software used by crooks, by 15%.
But disabling the hardware pre-installer will degrade performance in valid applications. In return, server operators will have to purchase additional hardware to meet their performance requirements, or increase the power limit for existing hardware. In either case, it all adds up to power consumption and additional costs.
According to the report, this malicious botnet has been exploited since at least December 2020, and mainly targets vulnerabilities in MySQL, Tomcat, Oracle WebLogic, and Jenkins. This shows that it is flexible enough to attack many different programs. It's not clear how widespread these attacks are right now, but they appear to be widespread enough for security researchers to pay more attention to in the near future.
You should read it
- French police successfully cracked down on a botnet that exploits 850,000 computers from more than 100 countries.
- The US warned about DealtaCharlie - DDoS botnet malware from Korea
- Microsoft has just taken down a huge botnet network
- Detecting cryptocurrency mining Botnet using photos of Taylor Swift to spread malicious code
- The same Skype ID malware author used to run IoT Botnet and apply for jobs
- How the botnet works
- WireX DDoS Botnet: tens of thousands of Android phones are hacked
- How many types of malware do you know and how to prevent them?
- What is a botnet, who does it use to attack, and how can you prevent botnet?
- Google can detect cryptocurrency mining malware without needing to install software on the user's computer
- Discover botnet hiding YouTube shadow stealthily deploying malicious activities
- Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malware
Maybe you are interested
How to enable Extension Performance Detector in Microsoft Edge
How to use Chrome's new performance controls
4 Wi-Fi Router Features for the Best Performance
AMD Ryzen Users Should Install This BIOS Update for a Free Performance Boost
Windows 11 24H2 Boosts Performance for AMD Ryzen Processors, But Not Intel
Cerebras Launches World's Fastest AI Inference Technology, 20x Performance Than NVIDIA