Common Information
Type | Value |
---|---|
Value |
xmrig |
Category | Tool |
Type | Malpedia |
Misp Type | Cluster |
Description | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-03-28 | 0 | MacStealer Malware Plucks Bushels of Data From Apple Users | ||
Details | Website | 2023-03-27 | 8 | JOE LEE TEST Analysis on Docker Hub malicious images: Attacks through public container images – Sysdig | ||
Details | Website | 2023-03-24 | 14 | L’espion (Cyberdefenders) | ||
Details | Website | 2023-03-16 | 13 | Previously Undiscovered TeamTNT Payload Recently Surfaced - Cado Security | Cloud Investigation | ||
Details | Website | 2023-03-13 | 0 | Remcos Trojan back on Check Point’s top 10 list of global threats | IT World Canada News | ||
Details | Website | 2023-03-13 | 41 | 安全事件周报 第10周 | ||
Details | Website | 2023-03-09 | 0 | Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware | ||
Details | Website | 2023-03-09 | 0 | New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic | ||
Details | Website | 2023-03-09 | 11 | February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government - Check Point Software | ||
Details | Website | 2023-03-09 | 21 | PlugX Malware Being Distributed via Vulnerability Exploitation - ASEC BLOG | ||
Details | Website | 2023-03-08 | 34 | GlobeImposter Ransomware Being Distributed with MedusaLocker via RDP - ASEC BLOG | ||
Details | Website | 2023-03-07 | 0 | Hackers using pirated Final Cut Pro to install cryptominers on Apple devices | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker - National Cyber Security Consulting | ||
Details | Website | 2023-03-03 | 21 | 취약점 공격으로 유포 중인 PlugX 악성코드 - ASEC BLOG | ||
Details | Website | 2023-03-02 | 0 | Hackers Exploit Containerized Environments to Steals Proprietary Data and Software | ||
Details | Website | 2023-03-02 | 2 | New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers | ||
Details | Website | 2023-03-01 | 138 | Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding | ||
Details | Website | 2023-03-01 | 1 | Exposed Redis Database Servers Churned for Cryptojacking | Cyware Hacker News | ||
Details | Website | 2023-02-28 | 34 | RDP를 통해 유포 중인 GlobeImposter 랜섬웨어 (with MedusaLocker) - ASEC BLOG | ||
Details | Website | 2023-02-28 | 7 | Kaiji Botnet Resurfaces, Unmasking Ares Hacking Group? | ||
Details | Website | 2023-02-28 | 0 | SCARLETEEL hackers use advanced cloud skills to steal source code, data | ||
Details | Website | 2023-02-28 | 9 | SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft – Sysdig | ||
Details | Website | 2023-02-27 | 37 | 奇安信威胁情报中心 | ||
Details | Website | 2023-02-24 | 0 | Cryptojackers Deploy Trojanized Mac Apps on The Pirate Bay | ||
Details | Website | 2023-02-24 | 0 | Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware - Binary Defense | ||
Details | Website | 2023-02-24 | 29 | Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part III: Oracle WebLogic |