Cybercrooks have been distributing a Bitcoin mining malware with the aid of a cracked version of the Andromeda bot, Fortinet researchers reported on Wednesday.
Andromeda, one of the most well-known botnets, is currently at version 2.09. However, older versions can still prove to be useful, as researchers have discovered.
Cybercriminals have cracked an older version of the Andromeda bot, version 2.06, and they’re leveraging it to distribute a Bitcoin miner.
In the operation observed by Fortinet, the attackers don’t seem to possess the source code for the bot so they’ve cracked the original version and modified it to suit their needs, researchers said. The threat is detected as W32/Kryptik.AFJS!tr.
“The author removed the call to the RC4 subroutine, which the original version of the bot used to encrypt/decrypt certain portions of the bot’s code. The author might have done this in order to make it much easier to update the encrypted data, such as the URL of the C&C server and the corresponding RC4 key for encrypting the network traffic,” Fortinet researchers explained in a blog post.
Once it infects a system, the Andromeda bot contacts its command and control (C&C) server and downloads a Bitcoin miner binary detected as Riskware/BitCoinMiner. The malware is a new version of the threat, Fortinet told SecurityWeek.
“According to our brief analysis of this cracked version of Andromeda 2.06, we can see that a botnet’s life cycle can be longer than expected. Cybercriminals can buy botnet kits from the underground market, but can also use abnormal ways such as what we have described here – by cracking existing bots,” researchers noted.
Research by SecurityWeek shows that cracked versions of Andromeda are available on several hacker forums.
Mining Bitcoins requires serious resources these days, which is why some cybercriminals prefer to target organizations that store large amounts of the virtual currency. A perfect example is the recent Bitstamp breach in which 19,000 BTC (worth roughly $5.2 million) have been stolen.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
