Active Stocks
Thu Apr 18 2024 14:55:30
  1. Tata Steel share price
  2. 160.65 0.37%
  1. Power Grid Corporation Of India share price
  2. 280.00 2.06%
  1. Infosys share price
  2. 1,419.00 0.30%
  1. NTPC share price
  2. 354.75 -1.25%
  1. State Bank Of India share price
  2. 747.75 -0.55%
Business News/ Technology / News/  Researchers find new variant of Golang cryptominer with likely links to China
BackBack

Researchers find new variant of Golang cryptominer with likely links to China

Though the volume of the threats detected is still quite low, the researchers managed to recognise seven IP addresses linked to the new variant

According to Barracuda Networks, Golang malware targets both Windows and Linux systems. Photo: iStockPhotoPremium
According to Barracuda Networks, Golang malware targets both Windows and Linux systems. Photo: iStockPhoto

NEW DELHI: A new variant of cryptominer malware Golang with possible links to China is being used to targetg Windows and Linux PCs, researchers at Barracuda Networks found.

Though the volume of the threats detected is still quite low, the researchers managed to recognise seven IP addresses linked to the new variant. Further research revealed the IP addresses were based out of China. This can mean that the attacks originated from China, or the attack was routed through Chinese servers to mask the actual source of the attack. It is a typical practice among hacker groups.

According to Barracuda Networks, Golang malware targets both Windows and Linux systems by attacking web application frameworks, application servers, and non-HTTP services such as Redis and MSSQL, instead of going after the end users.

Some of the exploits used by operators behind Golang were found to be targeting ThinkPHP web application framework, which is popular in China. An exploit is a program that finds and takes advantage of a security flaw in an application or system.

After infiltrating the system, Golang malware downloads multiple files such as Init/update script, a miner, a watchdog, a scanner, and a config file for the cryptominer. The files downloaded vary depending on the operating system on the device. For instance, on Windows PCs the malware also adds a backdoor. Once the files are downloaded, the malware starts mining the Monero cryptocurrency using XMRig, a known miner program.

“Malicious actors are once again turning to Golang as a malware language since it is not commonly tracked by antivirus software. As it targets vulnerable servers, it is still a top threat vector that cybercriminals look to exploit. However, we can defend organisations against this malware by monitoring the endpoints for suspicious activity as well as the surge in CPU usage, which is associated with most cryptominers," Fleming Shi, CTO at Barracuda Networks said in a statement.

Barracuda advises that organizations should have a web application firewall in place and configure it properly as the malware spreads by scanning the internet for vulnerable devices. Security patches and updates should also be kept handy if any vulnerability is detected.

Unlock a world of Benefits! From insightful newsletters to real-time stock tracking, breaking news and a personalized newsfeed – it's all here, just a click away! Login Now!

ABOUT THE AUTHOR
Abhijit Ahaskar
Abhijit writes on tech policy, gaming, security, AI, robotics, electronics and startups. He has been in the media industry for over 12 years.
Catch all the Technology News and Updates on Live Mint. Download The Mint News App to get Daily Market Updates & Live Business News.
More Less
Published: 30 Jun 2020, 12:07 PM IST
Next Story footLogo
Recommended For You
Switch to the Mint app for fast and personalized news - Get App