Malware & RansomwareHIGH

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

Featured image for Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics
#Phorpiex#ransomware#sextortion#crypto-clipping#LockBit

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🎯

Basically, hackers are using a powerful botnet to spread malware and scam people.

Quick Summary

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

What Happened

The Phorpiex botnet, also known as Trik, has resurfaced in the cybersecurity landscape, not as a new entity but as a reinvented criminal platform. Initially launched in 2011, this botnet has transformed from a basic spam tool into a sophisticated system capable of executing ransomware attacks, sending sextortion emails, and engaging in crypto-clipping. Its latest variant, the Twizt variant, employs a hybrid model combining traditional command-and-control (C2) servers with a peer-to-peer (P2P) network, making it more resilient against takedowns.

Who's Being Targeted

Currently, the Phorpiex botnet runs on 70,000 to 80,000 active devices daily, with over 1.7 million unique IP addresses tracked in the last 90 days. The most affected regions include Iran, Uzbekistan, China, Kazakhstan, and Pakistan. The botnet targets millions of users worldwide, with estimates suggesting that each spam campaign reaches between 2 million and 6 million email addresses.

Signs of Infection

Infected devices exhibit several signs, including unexpected system slowdowns, unauthorized network activities, and the presence of unusual files. Phorpiex establishes a foothold by copying itself into system directories and modifying registry keys, ensuring it restarts after reboots. It also spreads through removable USB drives, making it particularly insidious.

How It Works

Phorpiex conducts three major operations simultaneously: delivering mass ransomware, executing sextortion campaigns, and hijacking cryptocurrency wallets. The ransomware campaigns have been notably aggressive, with instances of LockBit Black ransomware being delivered to corporate networks. Additionally, sextortion emails threaten victims with fabricated webcam footage, demanding $1,800 in Bitcoin to avoid exposure.

Defensive Measures

Organizations are urged to take immediate action against Phorpiex infections. Recommended steps include:

  • Block known Phorpiex C2 IP addresses.
  • Monitor for unexpected autorun registry changes.
  • Restrict USB device access on corporate machines.
  • Disable UPnP on network routers and ensure operating systems are fully patched.
  • Deploy layered email filtering solutions to reduce spam and phishing risks.

Conclusion

The Phorpiex botnet's evolution highlights the ongoing threat of malware in the cyber landscape. Its ability to adapt and execute multiple criminal operations simultaneously makes it a formidable adversary. Awareness and proactive measures are essential to protect against its reach.

Pro Insight

🔒 Pro insight: The Phorpiex botnet's P2P architecture significantly complicates takedown efforts, necessitating enhanced detection and response strategies.

Sources

Original Report

CSCyber Security News· Tushar Subhra Dutta
Read Original

Related Pings

HIGHMalware & Ransomware

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Microsoft has linked Storm-1175 to a series of high-velocity ransomware attacks leveraging both N-day and zero-day vulnerabilities, significantly impacting various sectors.

Microsoft Security Blog·
HIGHMalware & Ransomware

Trojanized PyPI AI Proxy Steals User Data Silently

A malicious Python package named hermes-px has been found on PyPI, masquerading as a privacy-focused AI tool. Developers are unknowingly at risk of data breaches, as the package exfiltrates sensitive information. Immediate action is required to mitigate potential damage.

Cyber Security News·
HIGHMalware & Ransomware

Malicious Strapi NPM Packages Target Guardarian Users

36 malicious NPM packages targeting Strapi users have been discovered, capable of executing shells and harvesting credentials. The attack exploits Redis and PostgreSQL vulnerabilities, posing significant risks to Guardarian's ecosystem.

SecurityWeek·
HIGHMalware & Ransomware

ILSpy Domain Compromised - Malware Delivered to Developers

Hackers compromised the ILSpy WordPress domain, redirecting users to a malicious site. Developers are at risk of malware disguised as a browser extension. Stay vigilant and verify downloads!

Cyber Security News·
HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security Affairs·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security Affairs·