'Lemon Duck' Cryptominer Aims for Linux Systems

'Lemon Duck' Cryptominer Aims for Linux Systems

Blockchain & Cryptocurrency , Cryptocurrency Fraud , Cybercrime

Sophos: Hackers Add New Techniques to Target Enterprise Networks Chinmay Rautmare (@crautmare) • August 28, 2020    

The operators behind the "Lemon Duck" cryptominer have developed new techniques to better target enterprise-grade Linux systems, according to the security firm Sophos.


See Also: The Essential Guide to Security


The gang that developed the malware, which mines for monero cryptocurrency, also is now deploying new obfuscation techniques to avoid detection, Sophos says. Plus, the malware is "fileless" and will leave no trace on the network once its activities are complete.


Lemon Duck, which is written in Python, was first spotted in October 2019 in China and has since become a tool used worldwide by threat actors, according to Trend Micro.


Exploitation Techniques


The Lemon Duck hackers are using COVID-19 pandemic themes in spam emails to persuade recipients to open malicious attachments that download the cryptominer, according to the new report.


The malware uses the infected computer to replicate itself in a network and then uses the contacts from the victim's Microsoft Outlook account to send additional spam emails to more potential victims, the report notes.


"People are more likely to trust messages from peop ..

Support the originator by clicking the read the rest link below.