Tenant from Hell: Prometei's Unauthorized Stay in Your Windows Server
eSentire's Threat Response Unit detected Prometei botnet activity on a customer's Windows Server in the Construction industry. Prometei, a Russian-origin botnet active since 2016, features remote control, credential harvesting, crypto-mining, lateral movement, and C2 communication over clearweb and TOR. The malware uses complex encryption, including rolling XOR and RC4, for payload decryption and C2 communications. It establishes persistence as a Windows service, creates firewall exceptions, and downloads additional modules for specialized functions like credential theft and TOR routing. The attack likely began with compromised RDP credentials, followed by the execution of a malicious command to download and run the Prometei payload.
Pulse ID: 6989b43679c3651b67e4a034
Pulse Link: https://otx.alienvault.com/pulse/6989b43679c3651b67e4a034
Pulse Author: AlienVault
Created: 2026-02-09 10:17:26
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CredentialHarvesting #CyberSecurity #Encryption #InfoSec #Malware #OTX #OpenThreatExchange #RDP #Russia #ThreatResponseUnit #Windows #bot #botnet #eSentire #AlienVault




