Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto
May 19, 2026
Elite SOCs Operationalize Threat Intelligence: 3 Tactics
May 19, 2026
DirtyDecrypt Linux Kernel PoC Exploit Code Vulnerability Released
May 19, 2026
Home/CyberSecurity News/Prometei Botnet Attacks Windows Server for Remote Access,
CyberSecurity News

Prometei Botnet Attacks Windows Server for Remote Access,

Windows Server systems face a sophisticated attack campaign leveraging Prometei, a Russian-linked botnet active since 2016. This multi-functional malware combines cryptocurrency mining, credential...

Sarah simpson
Sarah simpson
February 11, 2026 3 Min Read
6 0

Windows Server systems face a sophisticated attack campaign leveraging Prometei, a Russian-linked botnet active since 2016.

This multi-functional malware combines cryptocurrency mining, credential theft, and remote-control capabilities to maintain long-term access to compromised systems.

The Prometei botnet infiltrates systems by exploiting weak or default credentials via Remote Desktop Protocol (RDP). Once attackers gain access, they execute a two-stage deployment command combining Command Prompt and PowerShell.

malicious command (source : esentire)
malicious command (source : esentire)

The attack requires the malware to write an XOR key file (mshlpda32.dll) to the Windows directory, which it then uses to decrypt and execute its main payload.

The malware deploys itself as a Windows service named “UPlugPlay” and copies itself to C:Windowssqhost.exe.

It creates Windows Firewall exceptions and Microsoft Defender exclusions to ensure uninterrupted operation and communication with command-and-control (C2) servers.

Advanced Capabilities and Encryption

Prometei demonstrates sophisticated technical capabilities through multiple layers of encryption.

The malware uses RC4, LZNT1, and RSA-1024 for C2 communications, making detection and analysis challenging.

It collects extensive system information, including computer names, hardware specifications, installed antivirus software, and running processes, using legitimate Windows tools like wmic.exe.

Sandbox bypassed Prometei's process tree of decoy actions(source : esentire)
Sandbox bypassed Prometei’s process tree of decoy actions(source : esentire)

The botnet communicates with C2 servers over both the clear web and the TOR network to maintain privacy.

It employs a rolling XOR key-based cipher to decrypt its code and data sections, with each byte using a unique transformation based on its position.

Prometei expands its capabilities by downloading modules like netdefender.exe, which monitors failed login attempts and blocks other attackers using firewall rules.

 Attack chain leading to Prometei  (source : esentire)
 Attack chain leading to Prometei (source : esentire)

This “jealous tenant” behavior ensures exclusive access for Prometei operators by preventing other threat actors from compromising the same system.

Additional modules include Mimikatz variants (miWalk32.exe and miWalk64.exe) for credential harvesting, rdpcIip.exe for lateral movement using default passwords, and windrlver.exe for SSH-based spreading.

The malware also includes TOR proxy modules (msdtc.exe and smcard.exe) to route traffic anonymously.​

UPlugPlay Windows Service (source : esentire)
UPlugPlay Windows Service (source : esentire)

Security esentire researchers have developed YARA rules and Python utilities to detect and analyze Prometei infections.

Organizations should implement strong password policies, multi-factor authentication for remote access, account lockout mechanisms, and monitor RDP services for suspicious activity.

The malware’s modular architecture allows continuous evolution, with modules being updated independently.

Patch bytes to debug Prometei's Windows service (source : esentire)
Patch bytes to debug Prometei’s Windows service (source : esentire)

Endpoint Detection and Response (EDR) solutions are essential for identifying the complex process chains and registry modifications that characterize Prometei infections.

Network monitoring should focus on unusual outbound connections to known C2 infrastructure and TOR exit nodes.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarePatchSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

BQTLock & GREENBLOOD Ransomware Encrypt & Attacking Organizations

Next Post

Critical SandboxJS Flaw Enables Remote Host Takeover

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Mini Shai-Hulud Supply Chain Attack Compromises Packages Compromised
May 19, 2026
Critical PostgreSQL Flaws Allow Code Execution & SQL
May 19, 2026
Critical Apache Flink Vulnerability Enables Remote code execution
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us