Cybersecurity researchers are warning of a recent spike in activity of a stealthyÂ digital currency miningÂ botnet. Known as Lemon Duck, it targets Windows users and spreads by sending rich text format (RTF) files via email.
Lemon Duck has been around since December 2018. However, researchers at Cisco-owned Talos Intelligence Group have noticed a sharp rise in DNS requests connected with its command-and-control (C2) servers since the end of August.
In aÂ blog post, the researchers revealed that Lemon Duck has 12 independent infection vectors, making it more potent than most malware. They include sending emails containing exploit attachments and brute-forcing a systemâ€™s SMB protocol. Once it infects a computer, it downloads a PowerShell loading script which disables the Windows Defenderâ€™s real-time protection. It also includes powershell.exe on the list of processes excluded from scanning.
Once installed, the botnet downloads and activates a mass-mailing module and then sends emails to all the victimâ€™s contacts through Microsoft Outlook. These emails contain two malicious files, readme.doc and readme.zip, that download and install Lemon Duck on the target computer. To entice their targets, the emails containÂ COVID-19Â related text.
Lemon Duck combines code taken from several open-source projects with code specifically designed by the hacker, â€œshowing moderate level of technical skills and understanding of security issues in Windows and various network protocols,â€ according to the report.
Talos researchers revealed that there were a number of overlaps between Lemon Duck and yet another cryptojacking malware dubbed Beapy that targeted East Asia in 2019. The two botnets also share emails and a number of URLs.
The resurgence of Lemon Duck is consistent with an uptick in digital currency mining malware recently observed by Talos, including the return of PowerGhost, Tor2Mine and Protemei.
Lemon Duck, like most other cryptojacking malware, mines Monero, a dark coin whose relative anonymity makes it the go-to for hackers. The botnetâ€™s most popular targets are Egypt, China, Iran, Vietnam and India.