Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Prometei Botnet Activity Spikes – SecurityWeek

Prometei Botnet Activity Spikes – SecurityWeek

Posted on June 24, 2025June 24, 2025 By CWS

An up to date variant of the Prometei malware is making the rounds, and exercise related to the botnet has surged over the previous months, Palo Alto Networks experiences.

A modular botnet initially found in July 2020, Prometei targets each Home windows and Linux methods for an infection, primarily for cryptocurrency mining and credential exfiltration.

The newest model of the malware, nevertheless, features a backdoor for extra malicious actions, integrates self-updating options, and depends on a website era algorithm (DGA) for command-and-control (C&C) server connectivity.

Prometei’s varied modules permit it to brute-force administrator passwords, exploit vulnerabilities, transfer laterally, steal victims’ information, set up C&C communication, and mine for cryptocurrency (notably Monero).

A February 2025 evaluation of a current malware pattern revealed that it was attaining persistence by making a service and a scheduled cron job, lacked a hardcoded mining pool, and will course of extra instructions obtained from its operators.

The newest iteration of the risk, noticed in March 2025, is packed utilizing Final Packer for eXecutables (UPX), which makes it smaller, Palo Alto Networks says.

Focusing on Linux methods, it decompresses itself in reminiscence throughout runtime and executes the ultimate payload, in order that the botnet can begin its operations.

The malware harvests broad system data, together with processor and motherboard data, OS particulars, system uptime information, and Linux kernel data. The information is shipped to the C&C server through an HTTP GET request.Commercial. Scroll to proceed studying.

The brand new Prometei model additionally reveals a deal with evading detection, whereas its emergence and spike in exercise display that it’s beneath lively improvement, Palo Alto Networks says.

“Whereas its major purpose is cryptocurrency (Monero) mining, Prometei additionally possesses secondary capabilities, akin to stealing credentials and deploying extra malware payloads. We assess that Prometei’s operations seem pushed by monetary achieve, and there’s no proof of ties to nation-state actors,” the cybersecurity agency notes.

Associated: Chinese language APT Hacking Routers to Construct Espionage Infrastructure

Associated: Latest Langflow Vulnerability Exploited by Flodrix Botnet

Associated: Not too long ago Disrupted DanaBot Leaked Useful Knowledge for 3 Years

Associated: 40,000 Safety Cameras Uncovered to Distant Hacking

Security Week News Tags:Activity, Botnet, Prometei, SecurityWeek, Spikes

Post navigation

Previous Post: Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code
Next Post: Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives

Related Posts

Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Security Week News
Stryker Hit by Major Cyberattack Linked to Iran Stryker Hit by Major Cyberattack Linked to Iran Security Week News
Russian Group Star Blizzard Utilizes DarkSword iOS Exploit Russian Group Star Blizzard Utilizes DarkSword iOS Exploit Security Week News
Cyber Insights 2026: Threat Hunting in an Age of Automation and AI Cyber Insights 2026: Threat Hunting in an Age of Automation and AI Security Week News
Cylake Secures M Funding for On-Premises Cybersecurity Cylake Secures $45M Funding for On-Premises Cybersecurity Security Week News
IoT Security Firm Exein Raises €100 Million IoT Security Firm Exein Raises €100 Million Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark