{"id":9036,"date":"2021-01-24T07:13:52","date_gmt":"2021-01-24T07:13:52","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=9036"},"modified":"2021-01-24T07:13:55","modified_gmt":"2021-01-24T07:13:55","slug":"sophosidentifies-source-of-mrbminer-attacks-targeting-database-servers","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/sophosidentifies-source-of-mrbminer-attacks-targeting-database-servers\/","title":{"rendered":"SophosIdentifies Source Of &#8220;MrbMiner&#8221; Attacks Targeting Database Servers"},"content":{"rendered":"\n<p><a href=\"http:\/\/www.sophos.com\/\">Sophos<\/a>, a global leader in next-generation cybersecurity, today published a new report onMrbMiner, \u201c<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/01\/21\/mrbminer-cryptojacking-to-bypass-international-sanctions\/\">MrbMiner: Cryptojacking to bypass international sanctions<\/a>,\u201dtracking its origin and management to a small software development company based in Iran.<\/p>\n\n\n\n<p>MrbMiner is a recently discovered cryptominer that targets internet-facing database servers (SQL servers) and downloads and installs a cryptominer. Database servers are an attractive target for cryptojackers because they are used for resource intensive activity and therefore have powerful processing capability.<\/p>\n\n\n\n<p>SophosLabs found that the attackers used multiple routes to install the malicious mining software on a targeted server, with the cryptominer payload and configuration files packed into deliberately mis-named zip archive files.<\/p>\n\n\n\n<p>The name of an Iran-based software company was hardcoded into the miner\u2019s main configuration file. This domain is connected to many other zip files also containing copies of the miner. These zip files havein turnbeen downloaded from other domains, one of which is mrbftp.xyz.<\/p>\n\n\n\n<p>\u201cIn many ways, MrbMiner\u2019s operations appear typical of most cryptominer attacks we&#8217;ve seen targeting internet-facing servers,\u201d said Gabor Szappanos, threat research director, SophosLabs. \u201cThe difference here is that the attacker appears to have thrown caution to the wind when it comes to concealing their identity. Many of the records relating to the miner&#8217;s configuration, its domains and IP addresses, signpost to a single point of origin: a small software company based in Iran.<\/p>\n\n\n\n<p>\u201cIn an age of multi-million dollar ransomware attacks that bring organizations to their knees it can be easy to discount cryptojacking as a nuisance rather than a serious threat, but that would be a mistake. Cryptojacking is a silent and invisible threat that is easy to implement and very difficult to detect. Further, once a system has been compromised it presents an open door for other threats, such as ransomware. It is therefore important to stop cryptojacking in its tracks. Look out for signs such as a reduction in computer speed and performance, increased electricity use, devices overheating and increased demands on the CPU.\u201d<\/p>\n\n\n\n<p>Further information on MrbMiner and other cyberthreats can be found on <a href=\"https:\/\/news.sophos.com\/en-us\/category\/sophoslabs\/sophoslabs-uncut\/\">SophosLabs Uncut<\/a>, where&nbsp;Sophos researchers regularly publish their latest research and breakthrough findings, such as <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/06\/09\/kingminer-report\/\">Kingminer escalates attack complexity for cryptomining<\/a>, as well as<a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/25\/lemon_duck-cryptominer-targets-cloud-apps-linux\/\">Lemon_Duck cryptominer targets cloud apps and Linux<\/a>, and <a href=\"https:\/\/news.sophos.com\/en-us\/2019\/12\/18\/mykings-botnet-spreads-headaches-cryptominers-and-forshare-malware\/\">MyKings botnet spreads headaches, cryptominers and Forshare malware<\/a>. Researchers can follow SophosLabs Uncut in real time on Twitter at <a href=\"https:\/\/twitter.com\/SophosLabs\">@SophosLabs<\/a>.<\/p>\n\n\n\n<p><strong>Detection and Indicators of Compromise<\/strong><\/p>\n\n\n\n<p>Cryptominer samples of MrbMiner are detected by Sophos under the definitionTroj\/Miner-ZD.<\/p>\n\n\n\n<p>Additional indicators of compromise have been published to the <a href=\"https:\/\/github.com\/sophoslabs\">SophosLabs Github<\/a>.<\/p>\n\n\n\n<p><strong>Additional Resources<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Learn more about current and emerging threats facing organisations, including ransomware, in the <a href=\"http:\/\/www.sophos.com\/threatreport\">Sophos 2021 Threat Report<\/a><\/li><li>To help stop ransomware attacks, read the <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-five-signs-youre-about-to-be-attacked\">five early indicators an attacker is present<\/a><\/li><li>Learn more about <a href=\"https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2020\/10\/sophos-launches-rapid-response-service-to-identify-and-neutralize-active-cybersecurity-attacks.aspx\">Sophos\u2019 new Rapid Response service<\/a> that disrupts attacks in real-time<\/li><li>Read the latest security news and views on Sophos\u2018 award-winning news website\u00a0<a href=\"https:\/\/nakedsecurity.sophos.com\/\">Naked Security<\/a> and on\u00a0<a href=\"https:\/\/news.sophos.com\/\">Sophos News<\/a><\/li><li>Connect with Sophos on\u00a0<a href=\"http:\/\/twitter.com\/sophos\">Twitter<\/a>,\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/sophos\/\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/securitybysophos\/\">Facebook<\/a>,\u00a0<a href=\"https:\/\/community.spiceworks.com\/pages\/sophos\">Spiceworks<\/a>, and\u00a0<a href=\"http:\/\/www.youtube.com\/user\/sophoslabs\">YouTube<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Sophos, a global leader in next-generation cybersecurity, today published a new report onMrbMiner, \u201cMrbMiner: Cryptojacking to bypass international sanctions,\u201dtracking its origin and management to a small software development company based in Iran. MrbMiner is a recently discovered cryptominer that targets internet-facing database servers (SQL servers) and downloads and installs a cryptominer. Database servers are an [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9037,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-9036","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",400,400,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",400,400,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",400,400,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs-150x150.jpeg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs-300x300.jpeg",300,300,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",400,400,false],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",400,400,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",400,400,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",400,400,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/01\/Gabor-Szappanos-threat-research-director-SophosLabs.jpeg",100,100,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"Sophos, a global leader in next-generation cybersecurity, today published a new report onMrbMiner, \u201cMrbMiner: Cryptojacking to bypass international sanctions,\u201dtracking its origin and management to a small software development company based in Iran. MrbMiner is a recently discovered cryptominer that targets internet-facing database servers (SQL servers) and downloads and installs a cryptominer. Database servers are an&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=9036"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9036\/revisions"}],"predecessor-version":[{"id":9038,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/9036\/revisions\/9038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/9037"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=9036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=9036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=9036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}