Remove Analysis Remove Cybersecurity Remove Mining Remove Systems administration
article thumbnail

New Linux Malware Shikitega Can Take Full Control of Devices

eSecurity Planet

The infamous XMRig mines Monero cryptocurrency that is known to be anonymity-focused, as it’s particularly hard to trace back. AT&T labs provided a list of IoCs (indicators of compromise) that system administrators can use to add specific rules to security solutions. Cybercriminals Use C2 Servers to Deploy Cryptominer.

Cloud 115
article thumbnail

WeSteal, a shameless commodity cryptocurrency stealer available for sale

Security Affairs

They will often describe potential “legitimate” uses for their malware – only to further describe anti-malware evasion properties, silent installation and operation or features such as cryptocurrency mining, password theft or disabling webcam lights.” ” reads the post published by Palo Alto Networks.

Sales 107