• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, Latest News, Network Security

Microsoft: Watch Out For This New Sysrv Botnet Varient

Microsoft is urging organizations to secure their systems after discovering a new Sysrv botnet variant that leverages security bugs.

May 17, 2022 Zachary Comeau Leave a Comment

Cryptojacking, Sysrv

Microsoft is urging organizations to secure internet-facing systems, apply security updates and secure credentials after discovering a new variant of the Sysrv botnet, which is known for exploiting vulnerabilities in web apps and databases to install coin miners on Windows and Linux systems.

In a series of tweets, the Redmond, Wash. IT giant says the new variant – which it calls Sysrv-K – is capable of additional exploits and gaining control of web servers.

The Microsoft Security Intelligence Twitter account tweets that Sysrv-K scans the internet to find web servers with various vulnerabilities to install itself, with bugs ranging from path traversal and remote file disclosure to arbitrary fire download and remote code execution flaws.

We encountered a new variant of the Sysrv botnet, known for exploiting vulnerabilities in web apps and databases to install coin miners on both Windows and Linux systems. The new variant, which we call Sysrv-K, sports additional exploits and can gain control of web servers.

— Microsoft Security Intelligence (@MsftSecIntel) May 13, 2022

Vulnerabilities largely include older bugs in WordPress plugins that have been patched, but some newer vulnerabilities are also being leveraged, including a code injection flaw in Spring Cloud Gateway (CVE-2022-22947) that could lead to arbitrary remote execution on a remote host. Once the malware is installed on a device, it deploys a cryptocurrency miner, per Microsoft’s tweets.

While using a botnet to deploy a cryptocurrency miner is not novel, Microsoft notes that Sysrv-K scans for WordPress configuration files and their backups to retrieve database credentials, which are then leveraged to gain control of the web server.

In addition, Sysvr-K has advanced communication capabilities, including the ability to use a Telegram bot.

Similar to older variants, Sysrv-K scans for SSH keys, IP addresses and the host names in an attempt to connect to other systems in the network via SSH to deploy copies of itself.

“This could put the rest of the network at risk of becoming part of the Sysrv-K botnet,” Microsoft Security Intelligence says via tweet. “We highly recommend organizations to secure internet-facing systems, including timely application of security updates and building credential hygiene.”

Microsoft also notes that Microsoft Defender for Endpoint detects this botnet, as well as older variants and their related behavior and payloads.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Botnet, Cybersecurity, Microsoft, Sysrv

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • Virgin Media O2 Partners with VMware to Complete…
  • White House AI Regulations, ChatGPT, Generative AI 5 Things You Need to Know About the…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.