Multiple GitLab Vulnerability Enable Attackers to Launch DoS Attacks
May 26, 2025DarkCrystal RAT aka DCRat – Active IOCs
May 27, 2025Multiple GitLab Vulnerability Enable Attackers to Launch DoS Attacks
May 26, 2025DarkCrystal RAT aka DCRat – Active IOCs
May 27, 2025Severity
High
Analysis Summary
Prometei is a sophisticated modular botnet malware that was first identified in 2016, with increased activity observed since 2020. Believed to be operated by a financially motivated Russian cybercriminal group, Prometei is not directly linked to a known APT group but exhibits advanced tactics often associated with state-sponsored campaigns.
Initially designed for stealthy Monero cryptocurrency mining, Prometei has evolved into a powerful tool capable of lateral movement, data theft, and establishing long-term persistence. It has been observed targeting countries across North and South America, Europe, and East Asia. The primary victims span critical infrastructure sectors, especially healthcare, manufacturing, financial services, and government organizations—entities where operational disruption can be particularly costly.
Prometei uses various tactics aligned with the MITRE ATT&CK framework, including exploitation of SMB vulnerabilities like EternalBlue (T1210), brute-force attacks to steal credentials (T1110), and leveraging remote services for lateral movement (T1021). It deploys multiple modules, including credential harvesters, SSH clients, and mining tools, allowing it to maintain persistence and operate silently within compromised environments.
The malware’s impact includes degraded system performance, increased resource consumption, and heightened risk of further infections. Beyond financial loss from cryptojacking, the presence of Prometei weakens organizational cybersecurity posture, leaving systems vulnerable to additional threats.
A recent campaign in early 2024 revealed Prometei exploiting Microsoft Exchange vulnerabilities and unsecured SMB services to infiltrate healthcare and education networks. This campaign underscored the malware’s adaptability and continued evolution in targeting techniques.
To reduce risk, organizations should prioritize regular patching and strong password policies. Additionally, endpoint protection and network monitoring tools can help detect and block Prometei’s activity early.
Impact
- Data Theft
- Lateral Movement
- Financial Loss
Indicators of Compromise
MD5
7a0623334d12707b1089114131f7799b
1fe5f6b9a9cec3df8f94d4e5654da969
caf9993ba28f38eeb8292af5565db9aa
SHA-256
0b9592a288b1c12cd82818c981f21d29b36ae9ce1ed93a4b7f4ffbd7b051ec92
f7c203b3fe5a60ace1318650d59e33b2464db3bb2c1e27af876f09ccb64e3671
912754975d340145ab5494360f1b868128cdf14c4b2beaf7f1c9df976e24e183
SHA1
080d582aedd2082caacf16f82f19cf5926e1d17f
9c391aa29d769c011ddfa630e60ace963a32a826
d44e20e30c882551a5d9d8a6c4b7b85ad8c4df23
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Regularly apply security patches and updates, especially for known vulnerabilities like SMB and Microsoft Exchange.
- Disable SMBv1 protocol and restrict access to SMB services where not needed.
- Implement strong password policies to prevent brute-force attacks.
- Use multi-factor authentication (MFA) for all remote and administrative access.
- Monitor network traffic for unusual lateral movement or unauthorized remote service use.
- Segment networks to limit the spread of infections across critical systems.
- Deploy endpoint detection and response (EDR) solutions to detect malicious activity.
- Conduct regular security awareness training to reduce the risk of credential compromise.
- Monitor for cryptomining activity or abnormal resource usage on endpoints.
- Restrict the use of administrative privileges and enforce least-privilege access controls.