“Tor2Mine” Has Returned to Infecting Systems With Cryptominers

  • An “old” cryptomining actor known as “Tor2Mine” has returned, and is coming with additional malware this time.
  • The group is still trying to infect systems with cryptominers but is also using RAT tools and info-stealers.
  • There are also new parts for the infrastructure, but some of the used domains and IPs have been deployed before.

Although the cryptojacking field is in a state of a continual demise when it comes to regular PC users, it is still a threat to IoTs, server farms, and powerful supercomputers. However, some actors are looking to return to the declining field, but with a spin that will render their operations more profitable. “Tor2Mine,” one of the cryptomining actors who were active back in 2018 and then entered a lengthy period of dormancy, has refreshed their malicious infrastructure and tools and is currently making a resurgence. According to a detailed Cisco Talos report, Tor2Mine isn’t limited only to cryptominers anymore, as it is using additional malware tools that can harvest credentials from the compromised systems.

This diversification is indicative of the instability that underpins the cryptocurrency market, and why cryptojacking groups are looking for alternate or additional ways to render their operations efficient. Tor2Mine has always been a profit-driven actor, but the profits from cryptocurrency during this period are all but stable and predictable. Thus, the group is now deploying the “Remcos” RAT (remote access tool), the DarkVNC backdoor Trojan, and also a variant of the AZORult info-stealer. Of course, the XMRigCC payload is still included in the Tor2Mine’s arsenal, but the spotlight is no longer fixed on it.

The Talos researchers also found out that the actor has updated their infrastructure, adding new domains that are often the results of compromises on unrelated entities like an environmental consulting company. However, it is noteworthy that the actors are still using some IPs that were employed back in 2018 and which have already been identified by previous investigations. This shows the actors are either not afraid of having their new infrastructure components associated with their previous activities or aren’t careful enough. Not having the financial resources to ditch everything that they used in the past and replace it with new attack launching points is also a possibility. Here are some of the indicators of compromise as identified and shared by Talos:

Domain

  • v1[.]fym5gserobhh[.]pw
  • res1[.]myrms[.]pw
  • eu1[.]minerpool[.]pw
  • eu1[.]ax33y1mph[.]pw
  • asq[.]r77vh0[.]pw
  • asq[.]d6shiiwz[.]pw

IPs

  • 107[.]181[.]187[.]132
  • 185[.]10[.]68[.]147
  • 195[.]123[.]234[.]33

This is an example that highlights the fact that cryptojacking is still a danger for users, no matter that the volatile cryptocurrency market is creating an environment that is far from ideal for malicious actors. While many ditch this sort of operation due to the aforementioned practical problems, some are looking to broaden the spectrum of their assault. Thus they are getting even more dangerous than before.

REVIEW OVERVIEW

Latest

Banking Trojan Targets 100 Organizations in Brazil

A banking trojan from Latin America was found targeting almost 100 Brazilian organizations and individuals.The malware was first noticed in late August...

The Number of Phishing Emails Impersonating Craigslist Is Growing

Craigslist Gsuite & Microsoft users are being targeted with phishing emails that present a fake user login page.These emails rely on brand...

Best Buy, Home Depot, and Lowes Drop Surveillance Companies Linked With Uyghur Oppression

Best Buy, Home Depot, and Lowes have decided to pull off the shelves all the security cameras from Lorex and Ezviz.The US...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari