article thumbnail

Pacha Group declares war to rival crypto mining hacking groups

Security Affairs

Two hacking groups associated with large-scale crypto mining campaigns, Pacha Group and Rocke Group , wage war to compromise as much as possible cloud-based infrastructure. “As an example, systemten[.]org org is in this blacklist and it is known that Rocke Group has used this domain for their crypto-mining operations.

Mining 65
article thumbnail

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

As an example, a specific Android TV device was also found to ship in this condition.” ” The binary establishes a connection to the C&C server, then scans processes running on the compromised device and attempts to kill any that are running the CoinHive script that could be mining Monero. Pierluigi Paganini.

Mining 47
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

30 Docker images downloaded 20M times in cryptojacking attacks

Security Affairs

The expert determined the number of cryptocurrencies that were mined to a mining pool account by inspecting the mining pool. Half of the images discovered by the expert were using a shared mining pool, by he estimated that threat actors mined US$200,000 worth of cryptocurrencies in a two-year period.

Mining 101
article thumbnail

KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks

Security Affairs

Akamai Security Research discovered a new evasive Golang-based malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak login credentials. The malware was employed in cryptocurrency mining campaigns and to launch denial-of-service (DDoS) attacks.

Mining 95
article thumbnail

Log4Shell was in the wild at least nine days before public disclosure

Security Affairs

. “Attackers may also leverage this vulnerability as a means of information disclosure to exfiltrate credentials (and other configurations) stored in files and environment variables from a vulnerable host. For example, the AWS CLI uses environment variables and configuration files that can be exfiltrated by exploiting CVE-2021-22448.

Mining 121
article thumbnail

Threat actors actively exploit JetBrains TeamCity flaws to deliver malware

Security Affairs

.” Threat actors can deploy ransomware as a final payload, for example, one of the earliest actors that the experts spotted exploiting the above issues deployed a variant of the open-source Jasmin ransomware.

article thumbnail

Highly evasive cryptocurrency miner targets macOS

Security Affairs

The malicious code uses i2p to download malicious components and send mined currency to the attacker’s wallet. The researchers noticed similarities with other examples reported by Trend Micro in February 2022. This malware relies on the i2p (Invisible Internet Project) anonymization network for communication.

Mining 95