{"id":2065,"date":"2021-12-18T00:07:47","date_gmt":"2021-12-18T00:07:47","guid":{"rendered":"http:\/\/egrowonline.com\/?p=2065"},"modified":"2021-12-18T00:07:47","modified_gmt":"2021-12-18T00:07:47","slug":"new-phorpiex-botnet-variant-steals-half-a-million-dollars-in-cryptocurrency","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=2065","title":{"rendered":"New Phorpiex Botnet Variant Steals Half a Million Dollars in Cryptocurrency"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both\"><a target=\"_blank\" href=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEh-R-qrzJ9O_ZJZQKYfpUCHOEBi6b3PzMsNzt7b1oAQd4rA8YJVFjOYjxRDY5JJ5Jza7ZlIsLLFvk2dkJv4B0VaUEsNDxw_3-VM73XzzYJzevPW9wXJdoZBTVHbajJLMDm1XkPKTULZ5xc1NJJqsQ54ojZVuDWaknCm0RLjskRisc3J0_C_Xb3BY-_I\" style=\"clear: left;float: left;text-align: center\" rel=\"noopener\"><img decoding=\"async\" alt=\"Dollars in Cryptocurrency\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\" src=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEh-R-qrzJ9O_ZJZQKYfpUCHOEBi6b3PzMsNzt7b1oAQd4rA8YJVFjOYjxRDY5JJ5Jza7ZlIsLLFvk2dkJv4B0VaUEsNDxw_3-VM73XzzYJzevPW9wXJdoZBTVHbajJLMDm1XkPKTULZ5xc1NJJqsQ54ojZVuDWaknCm0RLjskRisc3J0_C_Xb3BY-_I=s728-e1000\" title=\"Dollars in Cryptocurrency\" \/><\/a><\/div>\n<p>Cryptocurrency users in Ethiopia, Nigeria, India, Guatemala, and the Philippines are being targeted by a new variant of the Phorpiex botnet called <strong>Twizt<\/strong> that has resulted in the theft of virtual coins amounting to $500,000 over the last one year.<\/p>\n<p>Israeli security firm Check Point Research, which detailed the attacks, said the latest evolutionary version &#8220;enables the botnet to operate successfully without active [command-and-control] servers,&#8221; adding it supports no less than 35 wallets associated with different blockchains, including Bitcoin, Ethereum, Dash, Dogecoin, Litecoin, Monero, Ripple, and Zilliqa, to facilitate crypto theft.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/thehackernews.com\/2019\/10\/phorpiex-botnet-sextortion-emails.html\" rel=\"noopener\">Phorpiex<\/a>, otherwise known as Trik, is known for its sextortion spam and ransomware campaigns as well as cryptojacking, a scheme that leverages the targets&#8217; devices such as computers, smartphones, and servers to secretly mine cryptocurrency without their consent or knowledge.<\/p>\n<div class=\"ad_two clear\"><a target=\"_blank\" href=\"https:\/\/go.thn.li\/backhub-dm3\" rel=\"nofollow noopener sponsored\" title=\"Automatic GitHub Backups\"><img loading=\"lazy\" decoding=\"async\" alt=\"Automatic GitHub Backups\" class=\"lazyload\" src=\"https:\/\/thehackernews.com\/images\/-SmHk9U6ikBk\/YVHUUpxrNfI\/AAAAAAAA4ac\/xluSCU7878ErhlmIN9mj9pKf9fr3LTBwACLcBGAsYHQ\/s300-e100\/rewind-3-300.png\" width=\"300\" height=\"250\" \/><\/a><\/div>\n<p>It&#8217;s also infamous for its use of a technique called <a target=\"_blank\" href=\"https:\/\/www.digitalshadows.com\/blog-and-research\/cryptocurrency-attacks-to-be-aware-of-2021\/\" rel=\"noopener\">cryptocurrency clipping<\/a>, which involves stealing cryptocurrency in the process of a transaction by deploying malware that automatically substitutes the intended wallet address with the threat actor&#8217;s wallet address. Check Point said it identified 60 unique Bitcoin wallets and 37 Ethereum wallets used by Phorpiex.<\/p>\n<div class=\"separator\" style=\"clear: both\"><a target=\"_blank\" href=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEhdSlWeqR7ddsVicDIFlYj9n7VEbAfRR1x1vLODfPeJ4JbJmkbB_SqcPAMKJ2_cnQifkwK0OceF8h6_4WsQN1zxgXTW5epvzVddCHfb4pXAfzgJUTXP3EsQO5899d-j9rbWDSRChP1gA2Iv4juAJ-RBSMTlpILlQLAFinHuIIlktXCw3Mi9Qfc_660G\" style=\"clear: left;float: left;text-align: center\" rel=\"noopener\"><img decoding=\"async\" alt=\"Phorpiex Botnet\" border=\"0\" data-original-height=\"301\" data-original-width=\"728\" src=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEhdSlWeqR7ddsVicDIFlYj9n7VEbAfRR1x1vLODfPeJ4JbJmkbB_SqcPAMKJ2_cnQifkwK0OceF8h6_4WsQN1zxgXTW5epvzVddCHfb4pXAfzgJUTXP3EsQO5899d-j9rbWDSRChP1gA2Iv4juAJ-RBSMTlpILlQLAFinHuIIlktXCw3Mi9Qfc_660G=s728-e1000\" title=\"Phorpiex Botnet\" \/><\/a><\/div>\n<p>While the botnet operators shut down and put its source code for sale on a dark web cybercrime forum in August 2021, the command-and-control (C&amp;C) servers resurfaced a mere two weeks later to distribute Twizt, a previously undiscovered payload that can deploy additional malware and function in peer-to-peer mode, thus eliminating the need for a centralized C&amp;C server.<\/p>\n<div class=\"separator\" style=\"clear: both\"><a target=\"_blank\" href=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEiYHpM5Op4VR7-IST4fVHhjcJvzJDNjGvnQdJPC7H3HngMXTkHufOBHH3RR7GUMixd1gELZRhKPN3owE6DnYUgblTpsB8g65tMR2V4fCoRoc7amt-6PvV93CLiZ6R-cugRYDvP5ummsstgc0Llxh0dMpV1UaaGnZ90SRyRTX7TmPniY2sVTeeWYMTnV\" style=\"clear: left;float: left;text-align: center\" rel=\"noopener\"><img decoding=\"async\" alt=\"Phorpiex Botnet\" border=\"0\" data-original-height=\"400\" data-original-width=\"728\" src=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEiYHpM5Op4VR7-IST4fVHhjcJvzJDNjGvnQdJPC7H3HngMXTkHufOBHH3RR7GUMixd1gELZRhKPN3owE6DnYUgblTpsB8g65tMR2V4fCoRoc7amt-6PvV93CLiZ6R-cugRYDvP5ummsstgc0Llxh0dMpV1UaaGnZ90SRyRTX7TmPniY2sVTeeWYMTnV=s728-e1000\" title=\"Phorpiex Botnet\" \/><\/a><\/div>\n<p>The clipping feature also comes with an added advantage in that, once deployed, it can work even in the absence of any C&amp;C servers and siphon money from victims&#8217; wallets. &#8220;This means that each of the infected computers can act as a server and send commands to other bots in a chain,&#8221; Check Point&#8217;s Alexey Bukhteyev <a target=\"_blank\" href=\"https:\/\/research.checkpoint.com\/2021\/phorpiex-botnet-is-back-with-a-new-twizt-hijacking-hundreds-of-crypto-transactions\/\" rel=\"noopener\">said<\/a> in a report. &#8220;The emergence of such features suggests that the botnet may become even more stable and therefore, more dangerous.&#8221;<\/p>\n<div class=\"ad_two clear\"><a target=\"_blank\" href=\"https:\/\/go.thn.li\/crowdsec-inside-2\" rel=\"nofollow noopener sponsored\" title=\"Prevent Data Breaches\"><img loading=\"lazy\" decoding=\"async\" alt=\"Prevent Data Breaches\" class=\"lazyload\" src=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEgX1gDcM3NJ7zFIjh2jy_YjPVvQV-OXmjPoUNQ5e-4V05t95bJZjKKE8s8zCu6HcSbiNZlBWTDqjFtGlcNvkPu1bdFL3iwot1BI28jkqbfRmwmMWy4-ZqVBMdE1cnIiLTiCUnWYnIDLmQd_sAu3tfIn4vqXVTD_545AbcLymn536FoMwRzJh8yA6hWEdw=s728-e100\" width=\"728\" height=\"90\" \/><\/a><\/div>\n<p>Phorpiex-infected bots have been spotted in 96 countries, topped by Ethiopia, Nigeria, and India. The botnet is also estimated to have hijacked roughly 3,000 transactions with a total value of approximately 38 Bitcoin and 133 Ether. It&#8217;s, however, worth noting that the botnet is designed to halt its execution should the infected system&#8217;s locale be defaulted to Ukraine, suggesting that the botnet operators are from the East European nation.<\/p>\n<p>&#8220;Malware with the functionality of a worm or a virus can continue to spread autonomously for a long time without any further involvement by its creators,&#8221; Bukhteyev said. &#8220;In the past year, Phorpiex received a significant update that transformed it into a peer-to-peer botnet, allowing it to be managed without having a centralized infrastructure. The C&amp;C servers can now change their IP addresses and issue commands, hiding among the botnet victims.&#8221;<\/p>\n<p><\/p>\n<\/div>\n<p>\/\/e&amp;&amp;!t&amp;&amp;(jQuery.ajax({url:&#8221;https:\/\/thehackernews.com\/feeds\/posts\/default?alt=json-in-script&amp;max-results=4&#8243;,type:&#8221;get&#8221;,cache:!1,dataType:&#8221;jsonp&#8221;,success:function(e){for(var t=&#8221;&#8221;,s=&#8221;&#8221;,r=0;r&lt;e.feed.entry.length;r++){for(var a,l=0;l&lt;e.feed.entry[r].link.length;l++)if(&quot;alternate&quot;==e.feed.entry[r].link[l].rel){t=e.feed.entry[r].link[l].href;break}100&lt;(a=(a=&quot;content&quot;in e.feed.entry[r]?e.feed.entry[r].content.$t:&quot;summary&quot;in e.feed.entry[r]?e.feed.entry[r].summary.$t:&quot;&quot;).replace(\/<S>]*&gt;\/g,&#8221;&#8221;)).length&amp;&amp;(a=a.substring(0,90));var n=(n=e.feed.entry[r].title.$t).substring(0,50),o=(o=e.feed.entry[r].media$thumbnail.url.replace(\/\/s72-c-e100\/,&#8221;\/s260-e100&#8243;));s+=&#8217;<\/p>\n<article class=\"latest cf\"><a target=\"_blank\" class=\"latest-link\"><\/p>\n<div><img decoding=\"async\" src=\"'+o+'\" alt=\"'+n+'\" \/><\/div>\n<div>\n<div class=\"latest-h3\">&#8216;+n+&#8217;&#8230;<\/div>\n<\/div>\n<div class=\"latest-desc\">&#8216;+a+&#8221;&#8230;<\/div>\n<p><\/a><\/article>\n<p>&#8220;}s+=&#8221;&#8221;,document.getElementById(&#8220;result&#8221;).innerHTML=s}}),t=!0)})});<br \/>\n\/\/]]&gt;<\/p>\n<p><br \/>\n<br \/><a href=\"https:\/\/thehackernews.com\/2021\/12\/new-phorpiex-botnet-variant-steals-half.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency users in Ethiopia, Nigeria, India, Guatemala, and the Philippines are being targeted by a new variant of the Phorpiex botnet called Twizt that has resulted in the theft of virtual coins amounting to $500,000 over the last one year. Israeli security firm Check Point Research, which detailed the attacks, said the latest evolutionary version [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[43],"tags":[1978,52,1980,545,1977,1979,760],"class_list":["post-2065","post","type-post","status-publish","format-standard","hentry","category-litecoin","tag-botnet","tag-cryptocurrency","tag-dollars","tag-million","tag-phorpiex","tag-steals","tag-variant"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/2065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2065"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/2065\/revisions"}],"predecessor-version":[{"id":2066,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/2065\/revisions\/2066"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2065"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}