DreamBus Botnet
The DreamBus Botnet is a newly identified threat whose operators appear to be going after Linux-based systems and servers. So far, samples of the malware have been identified on many high-performing systems, which would allow the attacker to generate a lot of money through cryptocurrency mining operations. This is the exact purpose of the DreamBus Botnet – it uses the infected computer's hardware resources to mine for the Monero cryptocurrency.
The majority of the DreamBus Botnet attacks are concentrated in Russia and Eastern Europe, and we are yet to hear an estimate regarding the number of systems infected by the botnet. Cybersecurity experts confirm that the criminals behind the campaign are relying on multiple attack vectors to try and infect systems:
- Remote code execution (RCE) vulnerabilities.
- Brute-force attacks looking for weak login credentials.
- Other known exploits.
Some of the vulnerabilities that the DreamBus Botnet targets are found in popular software packages like Redis, PostgreSQL, Hadoop YARN and others. Needless to say, system administrators who keep their software up-to-date are unlikely to have their networks infiltrated by the DreamBus Botnet.
While having your system infected by the DreamBus Botnet is not likely to cause long-term damage, it may impair the network's performance greatly. The malware will use all available hardware resources to mine for Monero, therefore hindering the performance of other software. As mentioned earlier, preventing such malware attacks is possible by using up-to-date anti-virus software, as well as keeping all software up-to-date.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.