{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Daily Security Review","title":"Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/45529ac7\"></iframe>","width":"100%","height":180,"duration":2480,"description":"Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 2016—this modular malware continues to evolve rapidly, targeting both Windows and Linux systems across the globe. Originally designed for cryptocurrency mining, Prometei has expanded its capabilities to include credential theft, lateral movement, command execution, and stealthy persistence, making it an adaptable and resilient threat for enterprise environments.In this episode, we examine the latest developments in Prometei’s operations. Recent updates to the malware include a fully integrated backdoor, self-updating features, dynamic domain generation for command-and-control, and a wide range of evasion techniques to bypass detection. The botnet’s architecture allows operators to deploy new modules at will, giving Prometei flexibility typically seen in nation-state campaigns, though researchers currently attribute its activity to a financially motivated Russian cybercriminal group.Prometei’s modules enable it to:Mine Monero cryptocurrency using compromised CPU and GPU resourcesSteal user credentials from memory and the registryMove laterally using exploits like EternalBlue, brute-force attacks, and SMB-based credential reuseMaintain persistence through cron jobs, custom services, and scheduled tasksCommunicate over Tor and I2P networks and use domain generation algorithms for resilient C2 communicationDeploy web shells and covert Apache services on compromised hostsEvade static and dynamic analysis through packing and obfuscation techniquesWith more than 10,000 infections observed worldwide since late 2022—and an expanding geographic footprint—Prometei demonstrates how financially driven threat actors are leveraging advanced techniques to maximize profits while evading security defenses. The malware’s continual adaptation makes detection and mitigation a challenge, even for well-defended networks.This episode offers a...","thumbnail_url":"https://img.transistorcdn.com/pL79_MJFeJHamQ_ztImsGmDSMdl27VMk_30TAkieujE/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNzg5/ZjlhNzM5Y2M4Njli/NjkxNzgyODA2Nzhi/MDI2ZC5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}