Cryptojacking

Monero Mining Campaign Exploits Vulnerable Docker Services with 9Hits Viewer Twist

A novel campaign has emerged, targeting vulnerable Docker services with threat actors deploying the XMRig cryptocurrency miner alongside the 9Hits Viewer software as part of a multifaceted monetization strategy. Cloud security firm Cado highlights that this marks the first documented case of malware employing the 9Hits application as a payload, indicating a strategic shift by […]

Monero Mining Campaign Exploits Vulnerable Docker Services with 9Hits Viewer Twist Read More »

, , , ,

Researchers Uncover Undetectable Cloud-Based Crypto Miner Exploiting Microsoft Azure

November 8, 2023. Cybersecurity researchers at SafeBreach have revealed the development of the first fully undetectable cloud-based cryptocurrency miner using the Microsoft Azure Automation service. The miner, discovered through three different methods, can execute in a victim’s environment without raising suspicion. Leveraging a bug in the Azure pricing calculator, the miner can run an infinite

Researchers Uncover Undetectable Cloud-Based Crypto Miner Exploiting Microsoft Azure Read More »

, , ,

Apache Hadoop Exploitation: Unveiling a Monero Cryptominer Threat

Security analysts have uncovered a highly targeted attack centering around Apache Hadoop, a widely-used open-source distributed storage and processing framework. The assailants leverage a known misconfiguration in Hadoop’s YARN ResourceManager, enabling the creation and execution of applications without proper authentication. The attack follows a distinct pattern, involving an unauthenticated request to initiate a new application

Apache Hadoop Exploitation: Unveiling a Monero Cryptominer Threat Read More »

, , , ,

Cryptojacking Unveiled: Unauthorized Cryptocurrency Mining Poses Threats to Individuals and Enterprises

January 10, 2023. Cryptojacking, the covert use of an individual’s or organization’s computing power for cryptocurrency mining, poses a significant threat. This unauthorized practice often involves malware installed through phishing or code snippets inserted into ads or web pages. Cybercriminals exploit victims’ resources to mine cryptocurrency without the associated costs, leading to compromised system performance

Cryptojacking Unveiled: Unauthorized Cryptocurrency Mining Poses Threats to Individuals and Enterprises Read More »

, , , ,

Advanced Installer Exploited by Cybercriminals in Ongoing Cryptocurrency-Mining Malware Campaign Since November 2021

September 7, 2023. Since at least November 2021, cybercriminals have been misusing Advanced Installer, a legitimate Windows tool designed for software packaging, to distribute cryptocurrency-mining malware on compromised devices. In this scheme, the attacker leverages Advanced Installer to bundle authentic software installers like Adobe Illustrator, Autodesk 3ds Max, and SketchUp Pro with harmful scripts. By

Advanced Installer Exploited by Cybercriminals in Ongoing Cryptocurrency-Mining Malware Campaign Since November 2021 Read More »

, , ,
Scroll to Top