Security

Miner vs miner: Attack script seeks out and destroys competing currency crafters

There is no honour among CPU thieves

By Richard Chirgwin

11 SHARE

Cryptocurrency-mining malware-scum have started to write code that evicts rivals from compromised computers.

The miner in question was first noticed by SANS Internet Storm Center handler Xavier Mertens. Mertens spotted the PowerShell script on March 4, and noting that it kills any other CPU-greedy processes it spots on target machines, he wrote: “The fight for CPU cycles started!”

Pre-infection, the attack script checks whether a target machine is 32-bit or 64-bit and downloads files known to VirusTotal as hpdriver.exe or hpw64 (they're pretending to be HP drivers of some kind).

If successfully installed, the attack then lists running processes and kills any it doesn't like. Mertens noted that alongside ordinary Windows stuff, the list of death-marked processes includes many associated with cryptominers, some of which are listed below.

Silence
Carbon
xmrig32
nscpucnminer64
cpuminer
xmr86
xmrig
xmr

Mertens wrote that the script also checks for processes associated with security tools.

Marten's next post is also worth a look if you're a Linux admin. He followed up on this Tweet from ESET's Michal Malik.

It's a bash script that tries to push a miner onto Linux boxes, along with scanning the Internet for Windows machines vulnerable to the NSA's EternalBlue attack. ®

Sign up to our NewsletterGet IT in your inbox daily

11 Comments

More from The Register

No way, RSA! Security conference's mobile app embarrassingly insecure

Sorry about the hard-coded passwords, can we sell you some crypto now?

RSA coughs to critical-rated bug in its authentication SDK

Yup, that means if you code with it, your projects inherit the problem. Yay!

You blithering Ajit! Huawei burns Pai for FCC sh*tlist proposal

American broadband bossman's ban plan panned

AWSome, S3 storage literally costs pennies

Just ignore the retrieval fees and relatively lower resilience

Amazon tries to ruin infosec world's fastest-growing cottage industry (finding data-spaffing S3 storage buckets)

AWS comes up with blanket policies to smother public-facing cloud silos

US China-watcher warns against Middle Kingdom tech dominance

5G, IoT, and tech supply chains should go under spotlight

Apache Hadoop spins cracking code injection vulnerability YARN

Loose .zips sink chips 2: Electric Boogaloo

Mozilla accuses FCC of abdicating its role, ignoring comments in net neutrality lawsuit

Legal battle #433 over Pai's push to kill off rules

Huawei pleads with FCC to overturn US ban, says it's 'anticompetitive'

While Japan mulls own action against Chinese comms giant

Web doc iCliniq plugs leaky S3 bucket stuffed full of medical records

Exclusive Even the file names exposed sensitive info, claim researchers