New Lucifer Variant Used for Cryptocurrency Mining and DDoS

NJCCIC Alert

Original Release Date: 6/26/2020

Summary

A new variant of the Lucifer malware is capable of cryptocurrency mining and using infected machines to launch distributed denial-of-service (DDoS) attacks. Lucifer v.2 is part of a large campaign targeting vulnerable Windows devices. The malware scans for ports 135 and 1433 to find targets and initiates a credential stuffing attack to gain access to the system. The malware exploits a number of known vulnerabilities, including CVE-2014-6287, CVE-2018-1000861, CVE-2017-10271, CVE-2018-20062, CVE-2018-7600, CVE-2017-9791, CVE-2019-9081, CVE-2017-0144, CVE-2017-0145, and CVE-2017-8464. When engaging in cryptocurrency mining, the malware uses XMRig to mine Monero. Lucifer exploits vulnerabilities and uses brute-force attacks to spread to other devices on the network.

Recommendations

The NJCCIC recommends users and administrators ensure all devices are updated with the latest patch levels to prevent the exploitation of the above-mentioned vulnerabilities. More information and a list of indicators of compromise can be found in the Unit 42 post.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.