Prometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Prometei Botnet Attacks Linux Servers for Cryptocurrency MiningShake Network Technology NewsClick the right to follow for the latest technology news!Prometei Botnet Attacks Linux Servers for Cryptocurrency MiningPrometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Cybersecurity researchers have observed a significant increase in the activity of the complex malware Prometei botnet, which targets Linux servers for cryptocurrency mining and credential theft. This latest wave of attacks, observed since March 2025, showcases the evolving trends of cryptocurrency mining malware and its ongoing threat to global enterprise infrastructure.

Part01

Dual Threat of the Botnet

The Prometei botnet is a dual-threat malware family that includes both Linux and Windows variants, primarily aimed at hijacking computing resources for Monero mining while stealing credentials from the compromised systems. Analysts from Palo Alto Networks discovered this new wave of attacks in March 2025, noting significant improvements in stealth capabilities and operational complexity compared to previous versions.

This botnet operates on a modular architecture, allowing attackers to remotely control infected systems, deploy additional payloads, and maintain persistent access to the compromised networks. The Windows variant was first discovered in July 2020, followed by the Linux version in December 2020, which has continued to evolve to this day.

Part02

Multi-Vector Attack Methods

The malware employs multiple attack vectors, including brute-force credential attacks, exploitation of the infamous EternalBlue vulnerability associated with WannaCry ransomware, and manipulation of the Server Message Block (SMB) protocol vulnerabilities to achieve lateral movement within the target network. This multi-faceted approach allows Prometei to rapidly expand its impact after gaining initial access to organizational systems.

Researchers found that the economic motivation behind Prometei’s operations is quite evident, with no evidence linking the botnet to state actors. Instead, these activities exhibit characteristics typical of profit-driven cybercriminal enterprises, monetizing the compromised infrastructure through cryptocurrency mining while opportunistically collecting valuable credentials for potential reuse or sale on underground markets.

Part03

Advanced Evasion Techniques

The current version employs advanced evasion techniques, including a domain generation algorithm (DGA) to enhance the resilience of its command and control infrastructure, as well as self-updating capabilities that allow the malware to dynamically adapt to security defenses. These improvements make detection and mitigation efforts by traditional security solutions increasingly challenging.

Prometei Botnet Attacks Linux Servers for Cryptocurrency MiningPart04

Technical Infection Mechanisms and Propagation

The latest Prometei variant employs complex propagation and unpacking mechanisms, significantly increasing the difficulty of analysis. The malware spreads by sending HTTP GET requests to a specific server hxxp[://]103.41.204[.]104/k.php?a=x86_64 and achieves dynamic ParentID allocation through the parameter hxxp[://]103.41.204[.]104/k.php?a=x86_64.

Despite the misleading .php extension in the filename, the payload is actually a 64-bit ELF executable specifically targeting Linux systems, which is a deliberate obfuscation strategy. The malware uses UPX (Ultimate Packer for eXecutables) compression to reduce file size and increase the difficulty of static analysis. However, this implementation includes a critical modification that prevents standard UPX unpacking tools from functioning properly.

The developer attached a custom configuration JSON tail to the packed executable, disrupting the UPX tool’s ability to locate necessary metadata (including PackHeader and overlay_offset tails) required for successful unpacking. This configuration tail contains essential operational parameters that vary between different malware versions. While version two only supports basic fields such as config, id, and enckey, newer versions three and four add parameters like ParentId, ParentHostname, ParentIp, and ip, enabling more complex command and control communication and hierarchical botnet management capabilities.

Once successfully deployed, Prometei conducts comprehensive system reconnaissance by collecting processor information from /proc/cpuinfo, obtaining motherboard details via the command dmidecode –type baseboard, retrieving operating system specifications from /etc/os-release or /etc/redhat-release, system uptime data, and kernel information through the uname -a command. This intelligence gathering allows the malware to optimize its mining operations based on available hardware resources while providing attackers with a detailed infrastructure mapping for potential lateral movement activities.

Prometei Botnet Attacks Linux Servers for Cryptocurrency MiningPrometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Click to Share

Prometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Click to Save

Prometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Click to Like

Prometei Botnet Attacks Linux Servers for Cryptocurrency Mining

Click to View

Leave a Comment