Remove Analysis Remove Communications Remove File names Remove Mining
article thumbnail

Crooks exploit exposed Docker APIs to build AESDDoS botnet

Security Affairs

. “In this new attack, the threat actor first externally scans a given IP range by sending a TCP SYN packet to port 2375, the default port used for communicating with the Docker daemon.” ” reads the analysis published by Trend Micro. launching DDoS attacker, mining cryptocurrency, etc.). .”

article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

Now, Shellbot has re-appeared in the threat landscape in a recent campaign, targeting organizations worldwide with a new IRC server and new Monero pools, so we decided to deepen the analysis. Technical Analysis. This directory contains the crypto mining module named kswapd0. The initial script is the file named “ a ”.

Mining 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prometei, a new modular crypto-mining botnet exploits Windows SMB

Security Affairs

Prometei is a crypto-mining botnet that recently appeared in the threat landscape, it exploits the Microsoft Windows SMB protocol for lateral movements. Security experts from Cisco Talos discovered a new crypto-mining botnet, tracked as Prometei, that exploits the Microsoft Windows SMB protocol for lateral movements.

Mining 95
article thumbnail

Gab Has Been Breached

Troy Hunt

This (almost always) identifies you, it's literally how people communicate with *you*! In total, the file has 43,015 unique email addresses (including mine) which is a far cry less than the total row count. " You login with your email address. It's not a real email address, therefore it is not checked. Coincidence?

Passwords 145