Remove Analysis Remove File names Remove Mining Remove Security
article thumbnail

Microsoft warns of Dexphot miner, an interesting polymorphic threat

Security Affairs

Security experts at Microsoft analyzed a new strain of cryptocurrency miner tracked as Dexphot that has been active since at least October 2018. The malicious code abuse of the resources of the infected machine to mine cryptocurrency , according to the experts it has already infected 80,000 computers worldwide. . Pierluigi Paganini.

article thumbnail

Crackonosh Monero miner made $2M after infecting 222,000 Win systems

Security Affairs

Researchers have discovered a strain of cryptocurrency-mining malware, tracked as Crackonosh, that abuses Windows Safe mode to avoid detection. . ” reads the analysis published by Avast. Adaware Bitdefender Escan F-secure Kaspersky Mcafee (scanner only) Norton Panda. Follow me on Twitter: @securityaffairs and Facebook.

Mining 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A new Linux Botnet abuses IaC Tools to spread and other emerging techniques

Security Affairs

” reads the analysis published by Trend Micro. The botnet is currently involved in cryptocurrency mining activity, it delivers the XMRig Monero (XMR) miner onto the infected machines. ” If you want to receive the weekly Security Affairs Newsletter for free subscribe here. for spreading. Pierluigi Paganini.

Mining 100
article thumbnail

Crooks spread malware via pirated movies during COVID-19 outbreak

Security Affairs

We saw an active coin miner campaign that inserts a malicious VBScript into ZIP files posing as movie downloads. — Microsoft Security Intelligence (@MsftSecIntel) April 28, 2020. Experts observed an ongoing coin miner campaign that injects a malicious VBScript into ZIP files posing as movie downloads. Pierluigi Paganini.

Mining 87
article thumbnail

New NRSMiner cryptominer NSA-Linked EternalBlue Exploit

Security Affairs

” reads the analysis published by F-Secure. The new version of NRSMiner updates existing infections by downloading new modules and removing files and services installed by old previous versions. ” continues the analysis. One of the unzipped files named svchost.exe is the Eternalblue – 2.2.0

Mining 90
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Since the beginning of the year, security firms observed a new intense ransomware campaign spreading the Shade ransomware. Between January and February, a new, intense, ransomware campaign has been observed by many security firms. Technical analysis. Shade encrypts all the user files using an AES encryption scheme.

article thumbnail

Crooks exploit exposed Docker APIs to build AESDDoS botnet

Security Affairs

” reads the analysis published by Trend Micro. “A batch file first executes the WinEggDrop scanner (s.exe), which tries port 2375 on various hosts with Chinese IP address ranges specified in the ip.txt file.” launching DDoS attacker, mining cryptocurrency, etc.). .” ” states the report.