Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

Prediction markets are ditching the 'casino' label to become a regular part of how people track the news

May 2, 2026

Altura Enables On-chain Lending With AVLT on Morpho

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Researchers Accidentally Crash Cryptomining Botnet
Researchers Accidentally Crash Cryptomining Botnet
Security

Researchers Accidentally Crash Cryptomining Botnet

October 15, 2023No Comments2 Mins Read

Security researchers analyzing a prolific botnet managed to accidentally kill it due to the coding equivalent of a typing error, according to Akamai.

The cloud security firm detected the “KmsdBot” last month. The Golang-based bot is designed to conscript machines via SSH and weak credentials, and has the functionality to launch DDoS and cryptomining campaigns – targeting the gaming, technology and luxury car industries, among others.

Akamai decided to test some of the botnet’s command and control (C2) functionality as part of its research, so it set up a controlled environment by modifying a recent sample of KmsdBot to talk to an IP address in RFC 1918 address space.

“This allowed us to have a controlled environment to play around in – and, as a result, we were able to send the bot our own commands to test its functionality and attack signatures,” explained Akamai principal security intelligence response engineer, Larry Cashdollar.

“Interestingly, after one single improperly formatted command, the bot stopped sending commands.”

The command in question was simply missing a space between the target website and the port, but it was enough to bring the entire bot crashing down.

That’s because, unfortunately for the bot herders, KmsdBot didn’t have error-checking built into its code to verify that commands are properly formatted.

“Because of this, an improperly formatted command will cause the Go binary to crash with a stack trace stating an ‘index out of range’ error. This is because the wrong number of arguments were supplied,” explained Cashdollar.

“This malformed command likely crashed all the botnet code that was running on infected machines and talking to the C2 – essentially, killing the botnet.”

See also  Robinhood stock shrugs off a 47% crash in crypto revenue thanks to a massive surge in event betting

Even better for the Akamai team is the fact that the bot also didn’t have any ability to maintain persistence on an infected machine, so the group behind it will effectively now have to start from scratch by reinfecting machines.

“It’s not often we get this kind of story in security. In our world of zero days and burnout, seeing a threat that can be mitigated with the coding equivalent of a typo is a nice story,” Cashdollar concluded.

“This botnet has been going after some very large luxury brands and gaming companies, and yet, with one failed command it cannot continue.”

Source link

Accidentally Botnet Crash Cryptomining Researchers

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Predictive Cash Flow Modeling Market Is Booming Worldwide | Major Giants Oracle, SAP, Workday

March 2, 2026

HBAR Price Prediction: Hedera Eyes $0.12 Recovery After Testing Critical Support at $0.10

March 8, 2026

IPTV Providers – The Complete Guide to IPTV Streaming in Germany

March 8, 2026

Type above and press Enter to search. Press Esc to cancel.