TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home How to
How to protect a PC from Sysrv-hello, a new botnet that mines cryptocurrencies?

How to protect a PC from Sysrv-hello, a new botnet that mines cryptocurrencies?

Kerem GülenbyKerem Gülen
10 May 2021
in How to
Reading Time: 2 mins read
Share on FacebookShare on Twitter

If you don’t know how to protect a PC from Sysrv-hello we are going to help you out, it is a new botnet that mines cryptocurrencies on Windows and Linux without your knowledge. Hackers often take advantage of security flaws in computers to carry out their attacks. This is what happens with the new botnet that seeks to mine cryptocurrencies on both Windows and Linux systems. It scans for vulnerabilities to achieve its goal. It is called Sysrv-hello and was discovered by Alibaba Cloud.

Sysrv-hello is a botnet that searches for vulnerabilities in Windows or Linux

Hidden cryptocurrency mining is a very important vulnerability that we should be very attentive to. It can really cause performance issues in our PC and damage our hardware components. It is a type of threat that in recent years has increased considerably due to the rise of cryptocurrency mining.

At the end of the day, hackers are looking for ways to profit. They create new attack techniques, look for bugs they can exploit, and ultimately infect victims’ computers. With Sysrv-hello they manage to sneak a botnet for mining cryptocurrencies on both Windows and Linux. Specifically, it mines Monero, one of the most popular cryptocurrencies.

How to protect a PC from Sysrv-hello, a new botnet that mines cryptocurrencies?
How to protect a PC from Sysrv-hello, a new botnet that mines cryptocurrencies?

This botnet was first discovered in February but has been active since December 2020. It has now been updated to be able to use a single binary capable of automatically extracting and sneaking malware onto other devices.

According to security researchers, they rely on vulnerabilities they find in remote code execution in PHPUnit, Apache Solar, Confluence, Laravel, JBoss, Jira, Sonatype, Oracle WebLogic and Apache Struts.

It should be noted that once it has successfully hacked the server, this malware is able to spread across the network through brute force attacks using private SSH keys it collects from infected servers.

There have been mainly six exploited vulnerabilities:

  • Mongo Express RCE (CVE-2019-10758).
  • XML-RPC (CVE-2017-11610)
  • Saltstack RCE (CVE-2020-16846)
  • Drupal Ajax RCE (CVE-2018-7600)
  • ThinkPHP RCE (no CVE)
  • XXL-JOB Unauth RCE (no CVE)

How to protect a PC against cryptocurrency mining?

We have seen how this new botnet is able to infect Windows or Linux systems to carry out its attacks and mine cryptocurrencies. However, we can come across similar threats that can take advantage of our computers to achieve their goal. Avoiding botnet attacks is really important.

Undoubtedly the most important thing to avoid falling victim to this problem is to have updated equipment. The main advice is to always keep your computers up to date. It does not matter what operating system we are using.

How to protect a PC from Sysrv-hello, a new botnet that mines cryptocurrencies?
How to protect a PC from Sysrv-hello, a new botnet that mines cryptocurrencies?

It is also going to be important to have security programs. A good antivirus can help prevent many varieties of malicious software. It is essential to use antivirus no matter what operating system we are using.

But another fundamental issue is also common sense. We must avoid making mistakes that can be exploited by hackers and put our computers at risk. For example, it would be a mistake to download programs from third-party sites without verifying whether they are secure or not. Always be careful when downloading attachments from a mail. Also, connecting to unknown Wi-Fi networks might cause irreversible issues.

Tags: guidehow tolinuxminerstep by steptutorialWindows
ShareTweet
Kerem Gülen

Kerem Gülen

Kerem from Turkey has an insatiable curiosity for the latest advancements in tech gadgets and a knack for innovative thinking.With 3 years of experience in editorship and a childhood dream of becoming a journalist, Kerem has always been curious about the latest tech gadgets and is constantly seeking new ways to create.As a Master's student in Strategic Communications, Kerem is eager to learn more about the ever-evolving world of technology. His primary focuses are artificial intelligence and digital inclusion, and he delves into the most current and accurate information on these topics.

Related Posts

How to install mods and custom content in The Sims 2

How to install mods and custom content in The Sims 2

26 December 2025
Running Python files and fixing path errors on Windows

Running Python files and fixing path errors on Windows

26 December 2025
How to boot your PC into Command Prompt for troubleshooting

How to boot your PC into Command Prompt for troubleshooting

26 December 2025
How to delete a virus using Command Prompt

How to delete a virus using Command Prompt

26 December 2025
Please login to join discussion

LATEST

New WhatsApp update brings 2026 stickers and video call effects

Leaker reveals Xiaomi plans for high end eSIM device in 2026

HP prepares OMEN OLED monitor reveal for CES 2026

High RAM costs from AI boom could delay next Xbox and PlayStation

LG to unveil its Gallery TV at CES 2026

Bitcoin drops 3% to $87,300 as altcoins decline

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska