{"id":126705,"date":"2023-03-07T16:08:47","date_gmt":"2023-03-07T21:08:47","guid":{"rendered":"https:\/\/rbach.net\/?p=126705"},"modified":"2024-01-13T17:07:52","modified_gmt":"2024-01-13T22:07:52","slug":"blockchain-is-enabling-malware","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/blockchain-is-enabling-malware\/","title":{"rendered":"Blockchain is Enabling Malware"},"content":{"rendered":"\r\n<p><a href=\"https:\/\/publicdomainvectors.org\/en\/free-clipart\/Long-horned-beetle\/48445.html\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-126798 size-medium\" title=\"Blockchain is Enabling Malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/blochchain_bug-e1671486088279-150x86.jpg?resize=150%2C86&#038;ssl=1\" alt=\"Blockchain is Enabling Malware\" width=\"150\" height=\"86\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/blochchain_bug-e1671486088279.jpg?resize=150%2C86&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/blochchain_bug-e1671486088279.jpg?resize=75%2C43&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/blochchain_bug-e1671486088279.jpg?w=570&amp;ssl=1 570w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><strong>Blockchain<\/strong> was going to save the world. Remember the hype? It was going to <a title=\"Blockchain Could Help Us Save the Environment. Here's How.\" href=\"https:\/\/futurism.com\/blockchain-could-help-save-environment-heres-how\" target=\"_blank\" rel=\"nofollow noopener\">save the environment<\/a>. Blockchain was going to <a title=\"How blockchains could change the world\" href=\"https:\/\/www.mckinsey.com\/industries\/technology-media-and-telecommunications\/our-insights\/how-blockchains-could-change-the-world\" target=\"_blank\" rel=\"nofollow noopener\">change<\/a> <a title=\"How Blockchain Will Save The World\" href=\"https:\/\/www.geberconsulting.com\/blog\/how-blockchain-will-save-the-world\" target=\"_blank\" rel=\"nofollow noopener\">the<\/a> <a title=\"10 Ways Blockchain Technology Can Change The World Around You\" href=\"https:\/\/www.naukri.com\/learning\/articles\/how-blockchain-technology-can-change-the-world-around-you\/\" target=\"_blank\" rel=\"nofollow noopener\">world<\/a>.\u00a0 In a 2018 hype piece <a title=\"Wired\" href=\"https:\/\/www.wired.com\/\" target=\"_blank\" rel=\"nofollow noopener\"><em>Wired<\/em><\/a> listed \u201c<a title=\"187 Things the Blockchain Is Supposed to Fix\" href=\"https:\/\/www.wired.com\/story\/187-things-the-blockchain-is-supposed-to-fix\/\" target=\"_blank\" rel=\"nofollow noopener\">187 Things the Blockchain Is Supposed to Fix<\/a>.\u201d The first item on the 2018 <em>Wired<\/em> list of things blockchain was going to fix is \u201c<strong>Bots with nefarious intent<\/strong>.\u201d\u00a0<\/p>\r\n<p><a href=\"https:\/\/www.nozominetworks.com\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-126806\" title=\"Nozomi networks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_nozimi.jpg?resize=95%2C31&#038;ssl=1\" alt=\"Nozomi networks\" width=\"95\" height=\"31\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_nozimi.jpg?resize=75%2C24&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_nozimi.jpg?resize=150%2C48&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_nozimi.jpg?w=326&amp;ssl=1 326w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>Well, it is 2023 and Wired&#8217;s prediction is wrong. Cybersecurity firm <a title=\"Nozomi\" href=\"https:\/\/www.nozominetworks.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Nozomi<\/a> is <a title=\"Tracking Malicious Glupteba Activity Through the Blockchain\" href=\"https:\/\/www.nozominetworks.com\/blog\/tracking-malicious-glupteba-activity-through-the-blockchain\/\" target=\"_blank\" rel=\"nofollow noopener\">reporting<\/a> that blockchain is being <strong>used to enable malware<\/strong>. <em><a title=\"Bleeping Computer\" href=\"https:\/\/www.bleepingcomputer.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Bleeping Computer<\/a><\/em> <a title=\"Glupteba malware is back in action after Google disruption\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/glupteba-malware-is-back-in-action-after-google-disruption\/\" target=\"_blank\" rel=\"nofollow noopener\">writes<\/a> that the security researchers found the <a title=\"Glupteba Malware\" href=\"https:\/\/www.checkpoint.com\/cyber-hub\/threat-prevention\/what-is-malware\/glupteba-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">Glupteba<\/a> malware <a title=\"What is a Botnet?\" href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-botnet\" target=\"_blank\" rel=\"nofollow noopener\">botnet<\/a> has been resurrected. Glupteba is a blockchain-enabled malware that has been targeting Windows devices worldwide since at least 2011.<\/p>\r\n<h3>Blockchain-enabled malware<\/h3>\r\n<p>The San Fransisco cybersecurity firm describes Glupteba as a blockchain-enabled, modular malware that infects Windows and IoT devices. The malware is distributed through malvertising on <a title=\"Pay-per-install services provide access to thousands of compromised computers\" href=\"https:\/\/www.techrepublic.com\/article\/pay-per-install-services\/\" target=\"_blank\" rel=\"nofollow noopener\">pay-per-install<\/a> (PPI) networks and <a title=\"Traffic Distribution System\" href=\"https:\/\/software.sonicwall.com\/applications\/ips\/index.asp?ev=sig&amp;sigid=10160\" target=\"_blank\" rel=\"nofollow noopener\">traffic distribution systems<\/a> (TDS). It pushes the malware installer when the victim clicks on a weaponized link disguised as free software, videos, or movies. Once installed, the malware will <a title=\"Cryptojacking explained: How to prevent, detect, and recover from it\" href=\"https:\/\/www.csoonline.com\/article\/3253572\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\" target=\"_blank\" rel=\"nofollow noopener\">mine for cryptocurrency<\/a>, steal user credentials, and deploy proxies on compromised systems. The proxies are later sold as &#8216;<a title=\"Let\u2019s talk about the danger of residential proxy networks\" href=\"https:\/\/www.spamhaus.com\/resource-center\/lets-talk-about-the-danger-of-residential-proxy-networks\/\" target=\"_blank\" rel=\"nofollow noopener\">residential proxies<\/a>&#8216; to other cybercriminals.<\/p>\r\n<h3>Bitcoin wallet<\/h3>\r\n<p><a href=\"https:\/\/siliconangle.com\/2013\/04\/15\/how-to-sidestep-the-wordpress-botnet-hack\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-126809 size-medium\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-bnet_red.jpg?resize=150%2C108&#038;ssl=1\" alt=\"\" width=\"150\" height=\"108\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-bnet_red.jpg?resize=150%2C108&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-bnet_red.jpg?resize=75%2C54&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/super-bnet_red.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Glupteba uses the <a title=\"Bitcoin\" href=\"https:\/\/www.coindesk.com\/price\/bitcoin\/\" target=\"_blank\" rel=\"nofollow noopener\">Bitcoin<\/a> blockchain to evade disruption. The zombies get updated lists of <a title=\"Command and Control Explained\" href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/command-and-control-explained\" target=\"_blank\" rel=\"nofollow noopener\">command and control servers<\/a> to contact for commands to execute their malware activities from Bitcoin. The infested computers search the public Bitcoin blockchain for transactions related to wallet addresses owned by the attackers. From the Bitcoin wallet, the zombie clients can fetch an <a title=\"Advanced Encryption Standard (AES)\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/Advanced-Encryption-Standard\" target=\"_blank\" rel=\"nofollow noopener\">AES encrypted<\/a> address C2 server address.<\/p>\r\n<p>The malware uses the blockchain strategy to prevent takedowns, like the <a title=\"Google disrupted a massive botnet that hackers used to steal information and mine cryptocurrency\" href=\"https:\/\/www.washingtonpost.com\/technology\/2021\/12\/07\/google-glupteba-botnet-hack\/\" target=\"_blank\" rel=\"nofollow noopener\">Google December 2021 disruption<\/a>. Google was able to disrupt the blockchain-enabled botnet. The botnet was disrupted by gaining court orders to seize control of the botnet&#8217;s infrastructure and filing complaints against two Russian operators.<\/p>\r\n<p><strong><em>rb-<\/em><\/strong><\/p>\r\n<p><em>Because blockchain transactions cannot be erased (by design), it is much harder to take down C2 servers. Furthermore, without a Bitcoin private key, law enforcement cannot plant payloads onto the controller address to take over or shutdown a botnet. Ars has a deeper <a title=\"The bitcoin blockchain is helping keep a botnet from being taken down\" href=\"https:\/\/arstechnica.com\/information-technology\/2021\/02\/crooks-use-the-bitcoin-blockchain-to-protect-their-botnets-from-takedown\/\" target=\"_blank\" rel=\"nofollow noopener\">explanation here<\/a>.<\/em><br \/><br \/><em>Please remember that the original reason for Bitcoin was that it would do away with the need for trust in people. The assumption appears to be that you can trust the technology &#8211; but not people. This malware proves that this is a faulty premise.<\/em><\/p>\r\n<p>&nbsp;<\/p>\r\n<p style=\"text-align: center;\"><em><strong><a href=\"https:\/\/www.obama.org\/updates\/help-ukraine\/\" target=\"_blank\" rel=\"nofollow noopener\">How you can help Ukraine!<\/a><\/strong><\/em><\/p>\r\n<p><strong>Related article<\/strong><\/p>\r\n<ul>\r\n<li><a title=\"Ransom refusals hit attackers where it hurts: 40% revenue drop in 2022 \u2014 Chainalysis\" href=\"https:\/\/cointelegraph.com\/news\/ransom-refusals-hit-attackers-where-it-hurts-40-revenue-drop-in-2022-chainalysis\" target=\"_blank\" rel=\"nofollow noopener\">Ransom refusals hit attackers where it hurts: 40% revenue drop in 2022 \u2014 Chainalysis<\/a>\u00a0(<a title=\"Coin Telegraph\" href=\"https:\/\/cointelegraph.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Coin Telegraph<\/a>)<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers, and anything else that catches his attention since 2005. You can follow him on\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>A blockchain-enabled malware called Glupteba has been targeting Windows devices worldwide since at least 2011,<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[3652,857,2754,58,23,3656],"class_list":["post-126705","post","type-post","status-publish","format-standard","hentry","tag-3652","tag-bitcoin","tag-blockchain","tag-botnet","tag-malware","tag-wallet"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/126705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=126705"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/126705\/revisions"}],"predecessor-version":[{"id":127499,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/126705\/revisions\/127499"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=126705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=126705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=126705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}