Poorly Secured Docker Image Comes Under Rapid Attack
A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure. Continue reading Poorly Secured Docker Image Comes Under Rapid Attack
Collaborate Disseminate
A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure. Continue reading Poorly Secured Docker Image Comes Under Rapid Attack
Three different loaders and two payloads are hiding in audio files. Continue reading .WAVs Hide Malware in Their Depths in Innovative Campaign
Three different loaders and two payloads are hiding in audio files. Continue reading .WAVs Hide Malware in Their Depths in Innovative Campaign
Law enforcement takedown causes Retadup malware to eat itself. Continue reading Dangerous Cryptomining Worm Racks Up 850K Infections, Self-Destructs
A new XMRig Monero cryptominer stands apart, despite its non-flashy name. Continue reading Norman Cryptominer Employs Sophisticated Obfuscation Tactics
A Tiny Core Linux 9.0 image configured to run XMRig runs on a VM, rather than victim machines hosting the malware locally. Continue reading LoudMiner Cryptominer Uses Linux Image and Virtual Machines
A new wave of attacks involving PCASTLE malware are targeting systems located in China with the XMRig cryptocurrency miner. On 17 May, Trend Micro first observed a series of attacks that use PCASTLE, an obfuscated PowerShell script, to target mainly Ch… Continue reading PCASTLE Malware Attacks Targeting China-Based Systems with XMRig
A Monero cryptominer made a home on an Apache Tomcat server and just wouldn’t stay away. Continue reading The cryptominer that kept coming back
A rapidly-expanding campaign has infected 50,000 servers with malware that mines an open source cryptocurrency called TurtleCoin. Continue reading 50k Servers Infected with Cryptomining Malware in Nansh0u Campaign