back to article Splunk spots malware targeting Windows Server on AWS to mine Monero

Data analysis firm Splunk says it's found a resurgence of the Crypto botnet – malware that attacks virtual servers running Windows Server inside Amazon Web Services. Splunk's Threat Research Team (STRT) posted its analysis of the attack on Monday, suggesting it starts with a probe for Windows Server instances running on AWS, …

  1. Lil Endian Silver badge
    Pint

    Truely Unbiased Reporting!

    Kudos to Vulture Simon for suggesting solutions satisfying both sides:

    ...advice for those not wanting to avoid the attack is presumably to switch on RDP, use 'Admin/Passw0rd1234' as the login credentials and let 'er rip.

    Now that's proper sardonicism! Have one on me ;)

    1. Lil Endian Silver badge
      Facepalm

      Re: Truely Unbiased Reporting!

      I truely cannot spell...

    2. Anonymous Coward
      Anonymous Coward

      Re: Truely Unbiased Reporting!

      Pretty sure such unprotected systems may also be readily turned over to any number of nefarious activities beyond crypto mining. At least this type of attack might directly punish the feckless AWS tenant in the pocket.

  2. Howard Sway Silver badge

    Splunk's advice for those hoping to avoid the attack is simple

    Mine's even more simple. Don't use a vulnerable piece of bloated crap like Windows server. Oh, and don't use a cloud service provider, who can't notice and quickly stop something as basic as an attempt at a brute force password attack.

    1. TimMaher Silver badge
      Thumb Up

      Re: Splunk's advice for those hoping to avoid the attack is simple

      Actually, the cloud service provider will notice the attack, upscale the server & network availability and charge the client for the increase in resources. All automatically.

    2. mikepren

      Re: Splunk's advice for those hoping to avoid the attack is simple

      Guardduty from AWS has a specific finding on brute force RDP ports. Of course it has to be turned on, and some one has to read the alert. I'm ignoring the ability to automate a response on the basis that anyone who would leave an exposed RDP port is unlikely to have automated remediation.

      1. Pedantic

        Re: Splunk's advice for those hoping to avoid the attack is simple

        I read the Reg to keep myself educated, updated, amused and sometimes! frankly horrified & incedulous at the state of the computer networks most of the world have come to rely on (me included re: banking shopping etc!) This particular report has prompted a rare reply simply because I could not initially credit that any "cloud" system would not immediately see and flag/stop any brute force password attack within "it's own system"

        Then I got to "mikepren" reply that there is such a system in place called GuardDuty, so went toff to read how that works and yes seems very good, however its an extra!

        So I realise that in near everything I read on here, money (or lack of!) is the cause of so many of the gaffes, BUT the vendors have some responsiibility! otherwise we would have car makers saying it has "Some braking" but if you really want it to "Stop" you will have to pay extra!

        So I am left shaking my head in dismay & agree (if it at all possible) go with "Howard Sway" comment "Oh, and don't use a cloud service provider, who can't notice and quickly stop something as basic as an attempt at a brute force password attack." As in a provider who has a "Mandatory" Security checking system in place, not just one who obviously does not give a damm! other than of course to see another source of income!

  3. Blackjack Silver badge

    Since Monero keeps being used for stuff like this, how about banning it?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like