article thumbnail

Ngrok Mining Botnet

Security Affairs

Additionally, the campaign is sophisticated in seeking to detect, analyse and neutralise other competing crypto-mining malware. In my previous post I discussed the initial prototyping of a Docker Honeypot / Sandbox called Whaler. Firstly nearly all attacks observed were Crypto-mining attackers. Introduction.

Mining 93
article thumbnail

New Redis miner Migo uses novel system weakening techniques

Security Affairs

A new malware campaign targets Redis servers to deploy the mining crypto miner Migo on compromised Linux hosts. One of the honeypots used by Cado was targeted by an attack originating from the IP 103[.]79[.]118[.]221 Caro Security researchers have observed a new malware campaign targeting Redis servers with a crypto miner dubbed Migo.

Mining 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

No, I Did Not Hack Your MS Exchange Server

Krebs on Security

The group looks for attacks on Exchange systems using a combination of active Internet scans and “honeypots” — systems left vulnerable to attack so that defenders can study what attackers are doing to the devices and how. “We have been testing 367 known web shell paths via scanning of Exchange servers.”

Honeypots 347
article thumbnail

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

Security Affairs

The attacks were monitored by cybersecurity firm CrowdStrike, who discovered that the Docker Engine honeypots deployed between February 27 and March 1 were compromised and used in the DDoS attacks. CrowdStrike Intelligence assesses these actors almost certainly compromised the honeypots to support pro-Ukrainian DDoS attacks.

Honeypots 110
article thumbnail

New Go malware Capoae uses multiple flaws to target WordPress installs, Linux systems

Security Affairs

Upon infecting a system, the malware abuses its resources to mine cryptocurrency. . The researchers discovered the threat after a sample of the malware targeted one Akamai honeypot. “Download-monitor had been installed after the honeypot’s weak WordPress admin credentials had been guessed. .

article thumbnail

Vulnerable Docker Installations Are A Playhouse for Malware Attacks

Security Affairs

Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API port 2375. Figure 7:honeypot log – crypto miner attack. Figure 8: aaa.sh

article thumbnail

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections. In other words: HoneyPots. HoneyPot Page.