Kubernetes Falls to Cryptomining via Machine-Learning Framework
Misconfigured dashboards are at the heart of a widespread XMRIG Monero-mining campaign. Continue reading Kubernetes Falls to Cryptomining via Machine-Learning Framework
Collaborate Disseminate
Misconfigured dashboards are at the heart of a widespread XMRIG Monero-mining campaign. Continue reading Kubernetes Falls to Cryptomining via Machine-Learning Framework
The cybercriminals are using a deserialization vulnerability, CVE-2019-18935, to achieve remote code execution before moving laterally through the enterprise. Continue reading Blue Mockingbird Monero-Mining Campaign Exploits Web Apps
A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure. Continue reading Poorly Secured Docker Image Comes Under Rapid Attack
Three different loaders and two payloads are hiding in audio files. Continue reading .WAVs Hide Malware in Their Depths in Innovative Campaign
Three different loaders and two payloads are hiding in audio files. Continue reading .WAVs Hide Malware in Their Depths in Innovative Campaign
Law enforcement takedown causes Retadup malware to eat itself. Continue reading Dangerous Cryptomining Worm Racks Up 850K Infections, Self-Destructs
A new XMRig Monero cryptominer stands apart, despite its non-flashy name. Continue reading Norman Cryptominer Employs Sophisticated Obfuscation Tactics
A Tiny Core Linux 9.0 image configured to run XMRig runs on a VM, rather than victim machines hosting the malware locally. Continue reading LoudMiner Cryptominer Uses Linux Image and Virtual Machines
A new wave of attacks involving PCASTLE malware are targeting systems located in China with the XMRig cryptocurrency miner. On 17 May, Trend Micro first observed a series of attacks that use PCASTLE, an obfuscated PowerShell script, to target mainly Ch… Continue reading PCASTLE Malware Attacks Targeting China-Based Systems with XMRig