Prometei Botnet Resurges with Enhanced Capabilities and Global Reach

The Prometei botnet, a sophisticated and modular malware system, has experienced a significant resurgence since March 2025, as reported by Palo Alto Networks. This resurgence underscores the botnet’s continuous evolution and its persistent threat to global cybersecurity.

Background and Evolution

Initially identified in July 2020, Prometei has been active since at least 2016. Its primary functions include cryptocurrency mining, particularly Monero, and credential theft. Over the years, Prometei has demonstrated remarkable adaptability, incorporating new features and exploiting various vulnerabilities to enhance its effectiveness.

Recent Developments

The latest variant of Prometei, observed in early 2025, introduces several notable enhancements:

– Backdoor Integration: This feature allows attackers to execute additional malicious activities beyond the botnet’s primary functions.

– Self-Updating Mechanism: Prometei can now update itself autonomously, ensuring it remains effective against evolving security measures.

– Domain Generation Algorithm (DGA): The incorporation of DGA enables the botnet to dynamically generate domain names for its command-and-control (C&C) servers, enhancing its resilience against takedown efforts.

Infection Vectors and Techniques

Prometei employs a multifaceted approach to infiltrate systems:

– Exploitation of Vulnerabilities: The botnet targets unpatched Microsoft Exchange servers, leveraging known vulnerabilities such as CVE-2021-27065 and CVE-2021-26858 to gain initial access.

– Brute-Force Attacks: It attempts to gain access by systematically trying various administrator password combinations.

– Lateral Movement: Once inside a network, Prometei spreads by exploiting protocols like SMB and RDP, as well as using tools like SSH and SQL spreaders.

Global Impact

The botnet’s reach is extensive, affecting various industries, including finance, insurance, retail, manufacturing, utilities, travel, and construction. Infections have been reported worldwide, with significant activity in countries such as Brazil, Indonesia, Turkey, and Germany. Notably, the operators appear to avoid targeting systems in former Soviet bloc countries, suggesting a possible Russian origin.

Technical Details

Prometei’s architecture is highly modular, comprising multiple components that work in concert:

– Main Bot Module (sqhost.exe): This module manages backdoor capabilities and communicates with C&C servers.

– Credential Harvester (RdpcIip): It collects login credentials to facilitate further network penetration.

– Mining Module (SearchIndexer.exe): This component utilizes the infected system’s resources to mine Monero cryptocurrency.

The malware achieves persistence by creating services and scheduled tasks, ensuring it remains active even after system reboots. It also employs evasion techniques, such as packing with Ultimate Packer for eXecutables (UPX), to reduce its footprint and avoid detection.

Implications and Recommendations

The resurgence of Prometei highlights the ongoing threat posed by sophisticated botnets. Organizations are advised to:

– Patch Systems Promptly: Regularly update software to address known vulnerabilities.

– Monitor Network Activity: Implement robust monitoring to detect unusual patterns indicative of botnet activity.

– Enhance Credential Security: Use strong, unique passwords and implement multi-factor authentication to mitigate brute-force attacks.

By adopting these measures, organizations can bolster their defenses against Prometei and similar threats.