Tor2Mine cryptominer has evolved: Just patching and cleaning the system won’t help

Sophos released new findings on the Tor2Mine cryptominer, that show how the miner evades detection, spreads automatically through a target network and is increasingly harder to remove from an infected system. Tor2Mine is a Monero-miner that has been ac… Continue reading Tor2Mine cryptominer has evolved: Just patching and cleaning the system won’t help

Old crypto malware makes come back, hits Windows, Linux devices

By Deeba Ahmed
LemonDuck was first discovered in China in 2019 as a cryptocurrency botnet that used affected systems for Monero mining.
This is a post from HackRead.com Read the original post: Old crypto malware makes come back, hits Windows, Linux dev… Continue reading Old crypto malware makes come back, hits Windows, Linux devices

Chat logs show how Egregor, an $80 million ransomware gang, handled negotiations with little mercy

In a series of ransomware payment negotiations last December, operatives from a gang known as “Egregor” alternated from treating their victims with surprising civility, and behaving like cartoonish movie villains. “The Egregor Team wishes you a Merry Christmas and a Happy New Year,” they’d say at intervals of their chat room communications, sometimes in the middle of an extortion back-and-forth. “We wish you wisdom in your decision making and financial stability in this difficult time for us all. Happy Holidays!” In another exchange, they weren’t as kind, threatening to leak victims’ data and publish it on a website as a warning to other organizations that might fall in the group’s crosshairs. “We simply need to determine what category you should be placed in. In the category of those who are ready to negotiate and pay or in the category of scarecrows on our news site,” one exchange read. “It’s not […]

The post Chat logs show how Egregor, an $80 million ransomware gang, handled negotiations with little mercy appeared first on CyberScoop.

Continue reading Chat logs show how Egregor, an $80 million ransomware gang, handled negotiations with little mercy

New malware in pirated games disables Windows Updates, Defender

By Waqas
Dubbed Crackonosh by researchers; the malware uses the victim’s computer resources to mine cryptocurrencies for its developers.
This is a post from HackRead.com Read the original post: New malware in pirated games disables Windows Updates, Def… Continue reading New malware in pirated games disables Windows Updates, Defender

Prometei botnet uses NSA exploit, hits unpatched MS exchange servers

By Waqas
Unpatched MS Exchange Servers are being hunted by Prometei botnet to expand its army of Monero cryptocurrency mining bots.
This is a post from HackRead.com Read the original post: Prometei botnet uses NSA exploit, hits unpatched MS exchange se… Continue reading Prometei botnet uses NSA exploit, hits unpatched MS exchange servers

Monero-mining botnet targets orgs through recent MS Exchange vulnerabilities

The recent Microsoft Exchange Server vulnerabilities might have initially been exploited by a government-backed APT group, but cybercriminals soon followed suit, using them to deliver ransomware and grow their botnet. One perpetrator of the latter acti… Continue reading Monero-mining botnet targets orgs through recent MS Exchange vulnerabilities

A botnet named after Prometheus jumps is also exploiting Exchange Server flaws

Sometimes a glaring new software vulnerability is all that scammers need to revive a trusty hacking scheme.  Just days after Microsoft announced that suspected Chinese spies were exploiting bugs in Microsoft Exchange Server software in March, Russian-speaking attackers controlling a botnet, or army of compromised computers, used those vulnerabilities to conduct a series of intrusions at companies in North America, according to incident responders at security firm Cybereason. The hacks, which are among several breaches involving the Exchange Server vulnerabilities, show how the same bugs in widely used software can be used for very different purposes. And the reemergence of the so-called Prometei botnet, named after the Russian word for Prometheus, the Greek god of fire, is a reminder of the many malicious purposes that the zombie computers serve. Cybereason said it was aware of more than a dozen recent hacking incidents involving the Prometei botnet, which the attackers typically use […]

The post A botnet named after Prometheus jumps is also exploiting Exchange Server flaws appeared first on CyberScoop.

Continue reading A botnet named after Prometheus jumps is also exploiting Exchange Server flaws

Monero Cryptominer Attack Exploits Exchange Server Flaw

It didn’t take threat actors long to jump on a vulnerability affecting Microsoft Exchange mail server software. While exploits involving an array of malware from ransomware to webshells are well-documented, Sophos researchers report that other payload… Continue reading Monero Cryptominer Attack Exploits Exchange Server Flaw

[SANS ISC] Pastebin.com Used As a Simple C2 Channel

I published the following diary on isc.sans.edu: “Pastebin.com Used As a Simple C2 Channel“: With the growing threat of ransomware attacks, they are other malicious activities that have less attention today but they remain active. Think about crypto-miners. Yes, attackers continue to mine Monero on compromised systems. I spotted an interesting

The post [SANS ISC] Pastebin.com Used As a Simple C2 Channel appeared first on /dev/random.

Continue reading [SANS ISC] Pastebin.com Used As a Simple C2 Channel

Threat actors hijacking Bitbucket and Docker Hub for Monero mining

By Waqas
According to researchers, both developer resources were also targeted last year for Monero mining but now the campaign has resurfaced.
This is a post from HackRead.com Read the original post: Threat actors hijacking Bitbucket and Docker Hub fo… Continue reading Threat actors hijacking Bitbucket and Docker Hub for Monero mining