The new powerful encryption malware and DDoS, "Lucifer", exploits seriously vulnerabilities to infect Windows computers. According to Palo Alto Networks' Unit 42, Lucifer is part of an active campaign which targets Windows computers and uses a variety of applications. The malware operators gave their creation the name "Satan DDoS". But because Satan Ransomware is elsewhere, Palo Alto gave it another name.
In a blog post, researchers Ken Hsu, Durgesh Sangvikar, Zhibin Zhang and Chris Navarrete reported that the latter variation of Lucifer, v.2, was discovered on May 29, in an attempt to exploit CVE-2019-9081, a bug deserialization in the Laravel Framework, which can be used in attacks remote code execution. After a more detailed examination it was proved that this is a vulnerability of the many that exploits malware in parallel with CVE-2014-6287, CVE-2018-1000861, CVE-2017-10271, ThinkPHP RCE vulnerabilities (CVE-2018-20062) , CVE-2018-7600, CVE-2017-9791, CVE-2019-9081, CVE-2017-0144, CVE-2017-0145 and CVE-2017-8464, among others.
The updated code versions are available for all errors security, but on uninformed central computers, the attacks that exploit these errors are often insignificant to exploit, and executing code to extract cryptocurrencies is one of the ultimate goals. Lucifer is considered a powerful hybrid malware, which has the ability to encrypt and exploit infected computers to carry out DDoS attacks. In addition, malware seeks open ports TCP 135 (RPC) and 1433 (MSSQL) to find targets and attacks with credentials to gain access. It can infect its targets via IPC, WMI, SMB and FTP via brute-force attacks, as well as via MSSQL, RPC and network sharing. Once Lucifer is installed on an infected device, it "throws" XMRig, a program used to extract cryptocurrency Monero (XMR). It also connects to a command-and-control (C2) server to receive commands, transfer data from the compromised system and inform its operators about the status of the Monero cryptocurrency miner. To spread Lucifer, it uses various vulnerabilities and brute-force attacks, trying to compromise more Windows computers connected to the original point of infection. Malware also violates the Windows registry to be programmed as work at startup. It also tries to avoid detection by controlling the presence of sandboxes or virtual machines.
The first wave of attacks using Lucifer v.1 was detected on June 10. A day later, the malware was upgraded to version 2, which was particularly devastating for the devices that were targeted. Researchers recommend that users apply the required patches and updates in the affected software.