Remove Analysis Remove Mining Remove Security Remove Trends
article thumbnail

Russia-linked APT28 and crooks are still using the Moobot botnet

Security Affairs

Trend Micro researchers reported that the EdgeRouter botnet , called Moobot , used by the APT28 group is still active and is also used by cyber criminal organizations. Trend Micro also discovered that at least two prominent cybercriminal groups and the Russia-linked APT group Pawn Storm used the botnet. ” reported Trend Micro.

article thumbnail

Threat actors actively exploit JetBrains TeamCity flaws to deliver malware

Security Affairs

Trend Micro researchers are exploiting the recently disclosed vulnerabilities CVE-2024-27198 (CVSS score: 9.8) security flaws in JetBrains TeamCity to deploy multiple malware families and gain administrative control over impacted systems. Rapid7 published a detailed analysis of the two flaws here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nearly 50,000 IPs compromised in Kubernetes clusters by TeamTNT

Security Affairs

Researchers from Trend Micro reported that about 50,000 IPs were compromised across multiple Kubernetes clusters in a cryptojacking campaign conducted by TeamTNT group. ” reads the analysis published by Trend Micro. The malware deploys the XMRig mining tool to mine Monero cryptocurrency.

Mining 130
article thumbnail

Cryptomining campaign targets Linux systems with Go-based CHAOS Malware

Security Affairs

Researchers spotted a cryptocurrency mining campaign targeting Linux users with Go-based CHAOS malware (Trojan.Linux.CHAOSRAT). In November 2022, Trend Micro researchers discovered a cryptocurrency mining campaign targeting Linux users with Go-based CHAOS malware (Trojan.Linux.CHAOSRAT). Pierluigi Paganini.

Mining 99
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

A new version of the Abcbot bot targets Chinese cloud providers

Security Affairs

Security researchers discovered a new botnet, named Abcbot , that focused on Chinese cloud hosting providers over the past months. In November, researchers from Qihoo 360’s Netlab security team spotted the Abcbot botnet that was targeting Linux systems to launch distributed denial-of-service (DDoS) attacks. Pierluigi Paganini.

Cloud 126
article thumbnail

Abcbot and Xanthe botnets have the same origin, experts discovered

Security Affairs

Experts linked the C2 infrastructure behind an the Abcbot botnet to a cryptocurrency-mining botnet attack that was uncovered in December 2020. Experts linked the infrastructure used by the Abcbot DDoS botnet to the operations of a cryptocurrency-mining botnet that was uncovered in December 2020. Pierluigi Paganini.

Mining 84