New Lucifer malware hits Windows PCs - Security firm warns

Published by


Researchers at security company Unit 42 discovered the spread of a new strain of malware that is a variant of an old crypto theft code Ransomware. The new variant is used for cryptocurrency mining but can also facilitate distributed denial of service (DDoS) attacks.

A closer look revealed the malware, which they've called “Lucifer”, is capable of conducting DDoS attacks and well-equipped with all kinds of exploits against vulnerable Windows hosts. A quick note on the name: While the malware author named their malware Satan DDoS, there’s another malware, Satan Ransomware, bearing that devious name already. An alternative alias was given to this malware to avoid confusion. As a result of staying faithful to the unique strings in the binary, they've called this Lucifer.

Lucifer is quite powerful in its capabilities. Not only is it capable of dropping XMRig for cryptojacking Monero, but it’s also capable of command and control (C2) operation and self-propagation through the exploitation of multiple vulnerabilities and credential brute-forcing. Additionally, it drops and runs EternalBlue, EternalRomance, and DoublePulsar backdoor against vulnerable targets for intranet infections.

The exhaustive list of weaponized exploits includes CVE-2014-6287CVE-2018-1000861CVE-2017-10271ThinkPHP RCE vulnerabilities (CVE-2018-20062)CVE-2018-7600CVE-2017-9791CVE-2019-9081PHPStudy Backdoor RCECVE-2017-0144CVE-2017-0145, and CVE-2017-8464. These vulnerabilities have either “high” or “critical” ratings due to their trivial-to-exploit nature and their tremendous impact inflicted on the victim. Once exploited, the attacker can execute arbitrary commands on the vulnerable device. In this case, the targets are Windows hosts on both the internet and intranet, given that the attacker is leveraging certutil utility in the payload for malware propagation. Fortunately, the patches for these vulnerabilities are readily available.

Lucifer is a new hybrid of cryptojacking and DDoS malware variants that leverages old vulnerabilities to spread and perform malicious activities on Windows platforms. Applying the updates and patches to the affected software are strongly advised. The vulnerable software includes Rejetto HTTP File Server, Jenkins, Oracle Weblogic, Drupal, Apache Struts, Laravel framework, and Microsoft Windows. Strong passwords are also encouraged to prevent dictionary attacks.

So the best thing to do is to ensure that your Windows has the latest security updates . The second would be to use a strong password for your Windows account. Lucifer tries to break into systems, bombarding them with common usernames and passwords such as administrator " and " 123123", and so onwards..

New Lucifer malware hits Windows PCs - Security firm warns

Share this content
Twitter Facebook Reddit WhatsApp Email Print