article thumbnail

Ngrok Mining Botnet

Security Affairs

Additionally, the campaign is sophisticated in seeking to detect, analyse and neutralise other competing crypto-mining malware. In my previous post I discussed the initial prototyping of a Docker Honeypot / Sandbox called Whaler. Whaler – attack types and analysis. Pcap analysis of Ngrok attack. Introduction.

Mining 91
article thumbnail

New Redis miner Migo uses novel system weakening techniques

Security Affairs

A new malware campaign targets Redis servers to deploy the mining crypto miner Migo on compromised Linux hosts. One of the honeypots used by Cado was targeted by an attack originating from the IP 103[.]79[.]118[.]221 Caro Security researchers have observed a new malware campaign targeting Redis servers with a crypto miner dubbed Migo.

Mining 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Go malware Capoae uses multiple flaws to target WordPress installs, Linux systems

Security Affairs

Upon infecting a system, the malware abuses its resources to mine cryptocurrency. . The researchers discovered the threat after a sample of the malware targeted one Akamai honeypot. “Download-monitor had been installed after the honeypot’s weak WordPress admin credentials had been guessed. . Pierluigi Paganini.

article thumbnail

Abcbot and Xanthe botnets have the same origin, experts discovered

Security Affairs

Experts linked the C2 infrastructure behind an the Abcbot botnet to a cryptocurrency-mining botnet attack that was uncovered in December 2020. Experts linked the infrastructure used by the Abcbot DDoS botnet to the operations of a cryptocurrency-mining botnet that was uncovered in December 2020.

Mining 86
article thumbnail

Log4Shell was in the wild at least nine days before public disclosure

Security Affairs

A few hours ago, researchers at NetLab 360 reported that their Anglerfish and Apacket honeypots were already hit by attacks attempting to trigger the Log4Shell flaw in the Log4j library. ” reads the analysis published by Microsoft. The researchers spotted mining activity aimed at delivering of the Kinsing crypto-miner.

Mining 117
article thumbnail

Ransomware operators target CVE-2020-14882 WebLogic flaw

Security Affairs

Renato Marinho, a security researcher at Morphus Labs and SANS ISC handler reported that the WebLogic honeypots he set up were targeted by a large number of scans for CVE-2020–14882. “Starting late last week, we observed a large number of scans against our WebLogic honeypots to detect if they are vulnerable to CVE-2020–14882.”

article thumbnail

Vulnerable Docker Installations Are A Playhouse for Malware Attacks

Security Affairs

Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API port 2375. Figure 7:honeypot log – crypto miner attack. Figure 8: aaa.sh