Hackers are actively exploiting critical vulnerabilities in older versions of Rejetto’s HTTP File Server (HFS) to install Monero mining malware and other malicious software.

Exploitation of HTTP File Server Vulnerabilities

Hackers have identified a way to exploit older versions of the HTTP File Server (HFS), a software designed for publishing and sharing files, to deploy malicious Monero mining software. This security flaw, which affects HFS versions up to and including 2.3m, allows attackers to execute arbitrary commands remotely without requiring authentication. This enables them to take control of the server with ease.

Cybersecurity Insights

According to data from cybersecurity firm AhnLab, attackers are leveraging this vulnerability to deploy various malicious payloads. These include tools like XMRig, a software designed to mine Monero (XMR), and remote access trojans (RATs) such as XenoRAT and Gh0stRAT. While the exact scale of these attacks and the amount of Monero mined remain unclear, the threat is significant.

Rejetto has issued warnings confirming the bug and advising against the use of versions 2.3m through 2.4, describing them as β€œdangerous and should not be used anymore.”

Why Monero?

Cybercriminals prefer installing XMRig on infected devices due to Monero’s high privacy features, which make transactions difficult to trace. XMRig’s efficiency and versatility allow it to run on various hardware, and its open-source nature facilitates easy modification. Additionally, it can run stealthily in the background of a computer’s processes, minimizing the chance of being detected.

Protecting Your Systems

To safeguard your systems against such vulnerabilities, consider the following tips:

  • Update Software Regularly: Ensure you are using the latest versions of software to avoid known vulnerabilities.
  • Monitor Network Activity: Keep an eye on network traffic for unusual activity that might indicate a breach.
  • Use Security Software: Employ robust cybersecurity tools to detect and block malicious activities.
  • Educate Users: Train employees and users about the importance of cybersecurity and the risks of outdated software.

Stay informed about the latest cybersecurity threats and protect your investments by regularly checking in with Global Crypto News.