- Back to menuPrices
- Back to menuResearch
- Back to menu
- Back to menu
- Back to menu
- Back to menuResearch
New Monero Botnet Looks Like Last Year's Outlaw Attack
A rogue botnet uses a brute force attack and Secure Shell (SSH) exploit to give the attackers remote access to victim’s systems in order to mine Monero.

There’s another Monero mining botnet that’s targeting China. Or maybe it’s one we’ve seen before.
Bloggers steeped in the hacker-verse recently exposed a URL spreading a botnet that looks suspiciously like one unleashed by the Outlaw hacking group last year. The Outlaw outfit -- a name coined by its discoverers at Trend Micro, who translated “the Romanian word haiduc, the hacking tool the group primarily uses” -- is infamous for its previous release of a Perl-based shellbot that infiltrates through weaknesses in the Internet of Things.
The new attack, uncovered by Trend Micro’s honeypot security systems, has been restricted to computers based in China so far. The malware is spread through a malicious URL which bundles in a Monero-mining script and a backdoor-based exploit.
Trend Micro estimates that hackers have used crypto-jacking to mine $250,000 per month in Monero.
The Outlaw botnet uses a brute force attack and Secure Shell (SSH) exploit to give the attackers remote access over victim’s systems. A more detailed report of Outlaw’s previous attack showed that once the attackers have access, the malware executes commands to download and install the cryptocurrency miner payload. Additionally, if the malware detects cryptocurrency miners already installed on the system, it will delete them to reduce competition for system resources.
The security experts also noted that the backdoor component is also capable of launching distributed denial-of-service attacks which would allow the cybercriminals to monetize their botnet not only through mining, but by offering DDoS-for-hire services.
However, because the scripts haven’t been activated, Trend Micro believes the hackers are still in the testing and development phase. They suggest the malware may be laying dormant until future editions of the botnet are released.
This comment lead TheNextWeb to speculate whether the botnet has mined any cryptocurrency or made any successful attacks yet.
Monero image via CoinDesk Archives
Daniel Kuhn
Daniel Kuhn was a deputy managing editor for Consensus Magazine, where he helped produce monthly editorial packages and the opinion section. He also wrote a daily news rundown and a twice-weekly column for The Node newsletter. He first appeared in print in Financial Planning, a trade publication magazine. Before journalism, he studied philosophy as an undergrad, English literature in graduate school and business and economic reporting at an NYU professional program. You can connect with him on Twitter and Telegram @danielgkuhn or find him on Urbit as ~dorrys-lonreb.
