SHARE
Facebook X Pinterest WhatsApp

Malware Campaign Infects 40K+ Servers and IoT Devices

thumbnail
Malware Campaign Infects 40K+ Servers and IoT Devices

Researchers at Guardicore Labs have dubbed this malware attack as Operation Prowli.

Written By
thumbnail
Sue Walsh
Sue Walsh
Jun 22, 2018

Guardicore Labs researchers have discovered a new malicious campaign focused on monetizing rather than hacking has been discovered. The malware campaign, dubbed Operation Prowli, has infected over 40,000 IoT devices and servers.

It targets IoT devices, DSL modems, backup servers running HP Data Protector, and WordPress sites and forces them to conduct profit-making tasks like crypto mining and traffic-hijacking.

Cyber attackers guessed credentials and took advantage of known vulnerabilities. They used a variety of methods to monetize victims’ machines, employing digital currencies and traffic redirection.

Researchers say that these all too common traffic monetization frauds redirect website visitors from legitimate destinations to websites that advertise:

  • Malicious browser extensions
  • Tech support scam services
  • Fake services
  • Other phishing services

See also: Ixia sees malware clouds in the cloud in 2018

The researchers first discovered the campaign in April when they detected SSH attacks contacting a command and control server set up as a honeypot. They believe the campaign has been live since early 2018. The attacks apparently share identical behavior, connecting to the same C&C server and downloading the same attack tools and a cryptocurrency miner. They’ve detected attacks across several networks in multiple countries.

“Over a period of three weeks, we captured dozens of such attacks per day coming from over 180 IPs from a variety of countries and organizations,” researchers say. “These attacks led us to investigate the attackers’ infrastructure and discover a wide-ranging operation attacking multiple services.”

Researchers urge IoT device owners and those who use modems and servers to keep their firmware or software up to date and use strong passwords that they changed regularly.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Building Resilient and Sustainable Industries With AI, IoT, Software-Defined Systems, and Digital Twins
Peter Weckesser
Nov 26, 2025
Adaptive Edge Intelligence: Real-Time Insights Where Data Is Born
Skype May Be Gone, but P2P Is Here To Stay
Black Forest Labs Unveils FLUX.1 Kontext for Advanced Image Generation, Editing

Featured Resources from Cloud Data Insights

Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
The Role of Data Governance in ERP Systems
Sandip Roy
Nov 28, 2025
What Is Sovereign AI? Why Nations Are Racing to Build Domestic AI Capabilities
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.