Lyrix Ransomware – Active IOCs
June 3, 2025Multiple IBM QRadar Suite Software Vulnerabilities
June 4, 2025Lyrix Ransomware – Active IOCs
June 3, 2025Multiple IBM QRadar Suite Software Vulnerabilities
June 4, 2025Severity
High
Analysis Summary
Prometei is a sophisticated modular botnet malware that was first identified in 2016, with increased activity observed since 2020. Believed to be operated by a financially motivated Russian cybercriminal group, Prometei is not directly linked to a known APT group but exhibits advanced tactics often associated with state-sponsored campaigns.
Initially designed for stealthy Monero cryptocurrency mining, Prometei has evolved into a powerful tool capable of lateral movement, data theft, and establishing long-term persistence. It has been observed targeting countries across North and South America, Europe, and East Asia. The primary victims span critical infrastructure sectors, especially healthcare, manufacturing, financial services, and government organizations—entities where operational disruption can be particularly costly.
Prometei uses various tactics aligned with the MITRE ATT&CK framework, including exploitation of SMB vulnerabilities like EternalBlue (T1210), brute-force attacks to steal credentials (T1110), and leveraging remote services for lateral movement (T1021). It deploys multiple modules, including credential harvesters, SSH clients, and mining tools, allowing it to maintain persistence and operate silently within compromised environments.
The malware’s impact includes degraded system performance, increased resource consumption, and heightened risk of further infections. Beyond financial loss from cryptojacking, the presence of Prometei weakens organizational cybersecurity posture, leaving systems vulnerable to additional threats.
A recent campaign in early 2024 revealed Prometei exploiting Microsoft Exchange vulnerabilities and unsecured SMB services to infiltrate healthcare and education networks. This campaign underscored the malware’s adaptability and continued evolution in targeting techniques.
To reduce risk, organizations should prioritize regular patching and strong password policies. Additionally, endpoint protection and network monitoring tools can help detect and block Prometei’s activity early.
Impact
- Data Theft
- Lateral Movement
- Financial Loss
Indicators of Compromise
MD5
ab0f7fdfc00d89e8073eeb11a3730f92
eed01e4f82e9900bb7ec0152aea20710
b1801b7e19272e1df32f055b4d491221
SHA-256
bb06e38680cc14a83d6be6be19cc63cff6c4d52b1eb4e9058a7696fa7c6b9a15
e6a369b3b9de25cf71731096578b0b54627c8f88bc0be71473dfc26d900977e6
7a8730f57cc44c5002fc6b7dd46671f5735aef02da5c9ffd14f4977ab39bbe8a
SHA1
c825998890e856068826057c1ef7496b4531869a
2a9af26ccfbd5a727679d0cf06c3941f14dc12b6
cfd515cda32e7163e5a2261d6400e31f5940ea37
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Regularly apply security patches and updates, especially for known vulnerabilities like SMB and Microsoft Exchange.
- Disable SMBv1 protocol and restrict access to SMB services where not needed.
- Implement strong password policies to prevent brute-force attacks.
- Use multi-factor authentication (MFA) for all remote and administrative access.
- Monitor network traffic for unusual lateral movement or unauthorized remote service use.
- Segment networks to limit the spread of infections across critical systems.
- Deploy endpoint detection and response (EDR) solutions to detect malicious activity.
- Conduct regular security awareness training to reduce the risk of credential compromise.
- Monitor for cryptomining activity or abnormal resource usage on endpoints.
- Restrict the use of administrative privileges and enforce least-privilege access controls.