<s>
The	O
Zealot	B-Protocol
Campaign	I-Protocol
is	O
a	O
cryptocurrency	O
mining	O
malware	O
collected	O
from	O
a	O
series	O
of	O
stolen	O
National	O
Security	O
Agency	O
(	O
NSA	O
)	O
exploits	O
,	O
released	O
by	O
the	O
Shadow	O
Brokers	O
group	O
on	O
both	O
Windows	O
and	O
Linux	B-Application
machines	O
to	O
mine	O
cryptocurrency	O
,	O
specifically	O
Monero	B-Protocol
.	O
</s>
<s>
The	O
other	O
notable	O
exploit	O
within	O
the	O
Zealot	O
vulnerabilities	O
includes	O
vulnerability	O
,	O
known	O
as	O
DotNetNuke	B-Application
(	O
DNN	B-Application
)	O
which	O
exploits	O
a	O
content	O
management	O
system	O
so	O
that	O
the	O
user	O
can	O
install	O
a	O
Monero	B-Protocol
miner	O
software	O
.	O
</s>
<s>
An	O
estimated	O
USD	O
$	O
8,500	O
of	O
Monero	B-Protocol
having	O
been	O
mined	O
on	O
a	O
single	O
targeted	O
computer	O
.	O
</s>
<s>
The	O
term	O
“	O
Zealot	O
”	O
was	O
derived	O
from	O
the	O
StarCraft	B-Application
series	O
,	O
namely	O
a	O
type	O
of	O
warrior	O
.	O
</s>
<s>
This	O
multi-layered	O
attack	O
begins	O
with	O
two	O
HTTP	B-Protocol
requests	I-Protocol
,	O
used	O
to	O
scan	O
and	O
target	O
vulnerable	O
systems	O
on	O
the	O
network	O
.	O
</s>
<s>
Similar	O
attacks	O
in	O
the	O
past	O
were	O
only	O
targeted	O
to	O
either	O
Windows	O
or	O
Linux-based	O
systems	O
,	O
yet	O
Zealot	O
stands	O
out	O
by	O
being	O
prepared	O
for	O
both	O
with	O
its	O
version	O
of	O
Apache	O
Struts	O
exploit	O
along	O
with	O
using	O
DNN	B-Application
.	O
</s>
<s>
If	O
the	O
targeted	O
system	O
runs	O
on	O
either	O
Linux	B-Application
or	O
macOS	B-Application
,	O
the	O
Struts	O
 '	O
payload	O
will	O
install	O
a	O
Python	O
agent	O
for	O
the	O
post-exploitation	O
stage	O
.	O
</s>
<s>
Different	O
from	O
other	O
botnet	O
malware	O
,	O
the	O
Zealot	B-Protocol
campaigns	I-Protocol
request	O
the	O
Command	O
&	O
Control	O
(	O
C&C	O
)	O
server-specific	O
User-Agent	O
and	O
Cookie	O
headers	O
,	O
meaning	O
that	O
anyone	O
but	O
the	O
malware	O
will	O
receive	O
a	O
different	O
response	O
.	O
</s>
<s>
The	O
downloaded	O
zip	O
file	O
could	O
be	O
named	O
several	O
iterations	O
,	O
all	O
of	O
which	O
are	O
derived	O
from	O
the	O
StarCraft	B-Application
game	O
.	O
</s>
<s>
This	O
mining	O
software	O
has	O
reportedly	O
stolen	O
close	O
to	O
$	O
8,500	O
from	O
one	O
victim	O
,	O
yet	O
total	O
amounts	O
of	O
mined	O
Monero	B-Protocol
are	O
still	O
speculated	O
among	O
researchers	O
.	O
</s>
<s>
Initially	O
utilized	O
in	O
the	O
WannaCry	O
ransomware	O
attack	O
in	O
2017	O
,	O
this	O
exploit	O
was	O
specifically	O
utilized	O
as	O
a	O
mining	O
software	O
with	O
the	O
Zealot	B-Protocol
campaign	I-Protocol
.	O
</s>
<s>
While	O
not	O
much	O
is	O
known	O
about	O
this	O
exploit	O
,	O
it	O
was	O
used	O
in	O
cooperation	O
with	O
EternalBlue	O
,	O
along	O
with	O
other	O
exploits	O
in	O
the	O
Zealot	B-Protocol
campaign	I-Protocol
and	O
others	O
.	O
</s>
<s>
An	O
ASP.NET	O
based	O
content	O
management	O
system	O
,	O
DNN	B-Application
(	O
formerly	O
DotNetNuke	B-Application
)	O
sends	O
a	O
serialized	O
object	O
via	O
a	O
vulnerable	O
DNNPersonalization	O
cookie	O
during	O
the	O
HTTP	B-Protocol
request	O
stage	O
.	O
</s>
<s>
The	O
DNN	B-Application
acts	O
as	O
a	O
secondary	O
backup	O
for	O
the	O
attackers	O
,	O
should	O
the	O
Apache	O
Struts	O
exploit	O
fail	O
.	O
</s>
<s>
Used	O
to	O
deliver	O
a	O
PowerShell	O
script	O
to	O
initiate	O
the	O
attack	O
,	O
this	O
exploit	O
is	O
one	O
of	O
the	O
two	O
HTTP	B-Protocol
requests	I-Protocol
sent	O
during	O
the	O
initial	O
stage	O
of	O
infection	O
.	O
</s>
<s>
Among	O
the	O
first	O
discovered	O
of	O
the	O
exploits	O
of	O
the	O
Zealot	B-Protocol
campaign	I-Protocol
,	O
the	O
Jakarta	O
Parser	O
exploit	O
allowed	O
hackers	O
to	O
exploit	O
a	O
“	O
Zero-Day	O
”	O
flaw	O
in	O
the	O
software	O
to	O
hack	O
into	O
the	O
financial	O
firm	O
,	O
Equifax	O
in	O
March	O
2017	O
.	O
</s>
