![monero-mining-botnet-lemon-duck-records-spike-in-activity-min Businessman using digital tablet — Stock Photo, Image People on coffee break browsing in internet](https://coingeek.com/wp-content/uploads/2020/10/monero-mining-botnet-lemon-duck-records-spike-in-activity-min-1-380x188.jpg)
Monero-mining botnet Lemon Duck records spike in activity
Researchers at Talos Intelligence Group have noticed a sharp rise in DNS requests connected with its command-and-control servers since the end of August.
Researchers at Talos Intelligence Group have noticed a sharp rise in DNS requests connected with its command-and-control servers since the end of August.
The campaign, which researchers say began in May 2018, has been targeting Windows machines operating SQL servers.
The Stantinko botnet’s been a menace, infecting computers to mine digital currencies. A recent report has unearthed its stealthy tactics that keep it undetected.
Stantinko botnet is mining Monero on over 500,000 machines, using YouTube and other techniques to evade detection.
The botnet could be used in DDoS attacks by launching sequential attacks on public-facing servers running outdated versions of the search engine software.
The findings from cybersecurity company Kaspersky Labs identifies a growing trend towards using botnets in conjunction with crypto mining attacks.
In early December, 280,000 of these devil bots went live during a 12-hour period.