Common Information
Type Value
Value
xmrig
Category Tool
Type Malpedia
Misp Type Cluster
Description According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.
Details Published Attributes CTI Title
Details Website 2023-03-28 0 MacStealer Malware Plucks Bushels of Data From Apple Users
Details Website 2023-03-27 8 JOE LEE TEST Analysis on Docker Hub malicious images: Attacks through public container images – Sysdig
Details Website 2023-03-24 14 L’espion (Cyberdefenders)
Details Website 2023-03-16 13 Previously Undiscovered TeamTNT Payload Recently Surfaced - Cado Security | Cloud Investigation
Details Website 2023-03-13 0 Remcos Trojan back on Check Point’s top 10 list of global threats | IT World Canada News
Details Website 2023-03-13 41 安全事件周报 第10周
Details Website 2023-03-09 0 Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware
Details Website 2023-03-09 0 New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic
Details Website 2023-03-09 11 February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government - Check Point Software
Details Website 2023-03-09 21 PlugX Malware Being Distributed via Vulnerability Exploitation - ASEC BLOG
Details Website 2023-03-08 34 GlobeImposter Ransomware Being Distributed with MedusaLocker via RDP - ASEC BLOG
Details Website 2023-03-07 0 Hackers using pirated Final Cut Pro to install cryptominers on Apple devices | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker - National Cyber Security Consulting
Details Website 2023-03-03 21 취약점 공격으로 유포 중인 PlugX 악성코드 - ASEC BLOG
Details Website 2023-03-02 0 Hackers Exploit Containerized Environments to Steals Proprietary Data and Software
Details Website 2023-03-02 2 New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers
Details Website 2023-03-01 138 Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding
Details Website 2023-03-01 1 Exposed Redis Database Servers Churned for Cryptojacking | Cyware Hacker News
Details Website 2023-02-28 34 RDP를 통해 유포 중인 GlobeImposter 랜섬웨어 (with MedusaLocker) - ASEC BLOG
Details Website 2023-02-28 7 Kaiji Botnet Resurfaces, Unmasking Ares Hacking Group?
Details Website 2023-02-28 0 SCARLETEEL hackers use advanced cloud skills to steal source code, data
Details Website 2023-02-28 9 SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft – Sysdig
Details Website 2023-02-27 37 奇安信威胁情报中心
Details Website 2023-02-24 0 Cryptojackers Deploy Trojanized Mac Apps on The Pirate Bay
Details Website 2023-02-24 0 Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware - Binary Defense
Details Website 2023-02-24 29 Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part III: Oracle WebLogic