article thumbnail

The latest variant of the RapperBot botnet adds cryptojacking capabilities

Security Affairs

ssh/authorized_keys, anyone with the corresponding private key can authenticate the SSH server without supplying a password. Initially, they deployed and executed a separate Monero miner alongside the usual RapperBot binary, but starting from January 2023, they included the mining capabilities in the bot. ” continues the report.

Mining 94
article thumbnail

Cryptomining DreamBus botnet targets Linux servers

Security Affairs

“These techniques include numerous modules that exploit implicit trust, weak passwords, and unauthenticated remote code execution (RCE) vulnerabilities in popular applications, including Secure Shell (SSH), IT administration tools, a variety of cloud-based applications, and databases.” ” reads the post published by Zscaler.

Mining 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Highly evasive cryptocurrency miner targets macOS

Security Affairs

This malware relies on the i2p (Invisible Internet Project) anonymization network for communication. The malicious code uses i2p to download malicious components and send mined currency to the attacker’s wallet. Later first generation samples changed to a user Launch Agent, which would not require the conspicuous password prompt.

Mining 90
article thumbnail

DirtyMoe botnet infected 100,000+ Windows systems in H1 2021

Security Affairs

The Windows botnet has been active since late 2017, it was mainly used to mine cryptocurrency, but it was also involved in DDoS attacks in 2018. “Recently, a new infection vector that cracks Windows machines through SMB password brute force is on the rise” reads the analysis published by AVAST. ” continues the report.

Mining 127
article thumbnail

FBI, CISA Echo Warnings on ‘Vishing’ Threat

Krebs on Security

.” “The actors then convinced the targeted employee that a new VPN link would be sent and required their login, including any 2FA [2-factor authentication] or OTP [one-time passwords]. The actor logged the information provided by the employee and used it in real-time to gain access to corporate tools using the employee’s account.”

article thumbnail

Hackers target Docker servers to deploy the new Kinsing cryptocurrency miner

Security Affairs

Experts uncovered a hacking campaign that is breaching Docker clusters to deploy a new crypto-mining malware tracked as Kinsing. Cloud security firm Aqua Security uncovered a hacking campaign carried out during the past months, hackers are scanning the Internet for Docker servers running API ports exposed without a password.

Mining 99
article thumbnail

US Journalist Detained When Returning to US

Schneier on Security

After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and emails and calls and texts, including encrypted messages on WhatsApp, Signal, and Telegram. He read my communications with friends, family, and loved ones. Nothing on mine was spared.

Mining 103