Advertisement
Australia markets close in 2 hours 39 minutes
  • ALL ORDS

    8,406.30
    -68.00 (-0.80%)
     
  • ASX 200

    8,137.30
    -67.90 (-0.83%)
     
  • AUD/USD

    0.6844
    +0.0000 (+0.01%)
     
  • OIL

    73.75
    +0.04 (+0.05%)
     
  • GOLD

    2,682.60
    +3.40 (+0.13%)
     
  • Bitcoin AUD

    89,053.41
    -593.94 (-0.66%)
     
  • XRP AUD

    0.76
    -0.02 (-3.15%)
     
  • AUD/EUR

    0.6204
    +0.0007 (+0.11%)
     
  • AUD/NZD

    1.1021
    +0.0014 (+0.13%)
     
  • NZX 50

    12,566.04
    -6.62 (-0.05%)
     
  • NASDAQ

    19,793.34
    -9.24 (-0.05%)
     
  • FTSE

    8,282.52
    -8.34 (-0.10%)
     
  • Dow Jones

    42,011.59
    -184.93 (-0.44%)
     
  • DAX

    19,015.41
    -149.34 (-0.78%)
     
  • Hang Seng

    22,544.60
    +431.09 (+1.95%)
     
  • NIKKEI 225

    38,732.41
    +180.35 (+0.47%)
     

Monero Hacker Group ‘Outlaw’ Is Back and Targeting American Business: Report

A group specializing in hijacking victims’ computer power to mine for monero has returned with new tools to attack businesses based in the U.S. and Europe.

Japanese cybersecurity firm Trend Micro reported Monday the group, known as Outlaw, had begun infiltrating Linux-based enterprise systems in order to hijack computer power and mine for the privacy coin monero (XMR), a process known as cryptojacking.

Trend Micro’s report said Outlaw used a combination of pre-existing tools and new techniques to monitor for programs that could detect its malware.

Related: North Korea Is Expanding Its Monero Mining Operations, Says Report

The newly improved malware can also hunt down and kill existing mining bots – even the group’s previous miners – found in infected systems, taking out the competition and improving mining profits. Past iterations had only been able to partially reduce the activity of rival mining bots.

Trend Micro said Outlaw’s activity began increasing in December following several months of inactivity. “[W]e expect the group to be more active in the coming months as we observed changes on the versions we acquired,” the report reads.

Although Outlaw had previously confined itself to computer systems in China, Trend Micro’s report found it was now targeting businesses in Europe and the U.S. The cybersecurity firm found the group targeted several of its honeypots – mechanisms designed to lure hackers to attack it – situated across the Eastern European region.

The report did not disclose the names of any businesses, in the U.S. or elsewhere, that had been affected by Outlaw’s malware.

Related: Do Custodians Wield Undue Influence on Crypto Market Prices?

The group might also try to steal information and sell it to the highest bidder, Trend Micro said. Companies in the financial and auto industries that have not recently updated their internet security systems are at high risk, the cybersecurity firm warned.

Outlaw first came to prominence in 2018 after it installed crypto-mining bots in the software of internet-of-things (IoT) devices. In 2019, Trend Micro detected the group attacking computer systems in China with a similar malware design that would hijack computer power to mine monero.

Malware that hijacks computer power to mine monero is not uncommon. In February 2018, more than half a million computers were infected with a botnet that mined nearly 9,000 XMR tokens (then worth approximately $3.6 million) over a nine-month period. Being a privacy coin, hackers can sell monero without risk of detection from authorities.

Very little is known about the Outlaw hacking group, not even what it call itself. Trend Micro coined the name “Outlaw” as a translation of the Romanian word haiduc, which is the name of one of the group’s favorite hacking tools.

Related Stories