Common Information
Type | Value |
---|---|
Value |
xmrig |
Category | Tool |
Type | Malpedia |
Misp Type | Cluster |
Description | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-09-04 | 21 | Unpacking the unpleasant FIN7 gift: PackXOR | ||
Details | Website | 2024-09-04 | 2 | XMRig 코인 마이너를 유포하는 BMOF(Binary Managed Object File) (MDS 제품 탐지) - ASEC | ||
Details | Website | 2024-09-04 | 2 | Binary Managed Object File (BMOF) Distributing XMRig CoinMiner (Detected by MDS) - ASEC | ||
Details | Website | 2024-09-03 | 5 | Iran Cyber Threat Resource Center: How to Navigate Amid Geopolitical Conflicts and Tensions | ||
Details | Website | 2024-09-03 | 0 | Cryptojacking facilitated by critical Atlassian Confluence exploit | ||
Details | Website | 2024-09-03 | 7 | Iran Cyber Threat Resource Center: How to Navigate Amid Geopolitical Conflicts and Tensions | ||
Details | Website | 2024-09-03 | 2 | Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks | ||
Details | Website | 2024-09-02 | 98 | Head Mare: adventures of a unicorn in Russia and Belarus | ||
Details | Website | 2024-09-02 | 98 | Head Mare hacktivists: attacks on companies in Russia and Belarus | ||
Details | Website | 2024-09-02 | 1 | Atlassian Confluence 漏洞被利用于加密货币挖矿活动-安全客 - 安全资讯平台 | ||
Details | Website | 2024-08-30 | 1 | Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns | ||
Details | Website | 2024-08-30 | 1 | Threat actors exploit Atlassian Confluence bug in cryptomining campaigns | ||
Details | Website | 2024-08-29 | 13 | What kind of summer has it been? | ||
Details | Website | 2024-08-29 | 1 | 攻击者利用严重 Atlassian Confluence 漏洞进行加密劫持-安全客 - 安全资讯平台 | ||
Details | Website | 2024-08-28 | 11 | Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem | ||
Details | Website | 2024-08-22 | 2 | New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining | ||
Details | Website | 2024-08-20 | 21 | The gift that keeps on giving: A new opportunistic Log4j campaign | Datadog Security Labs | ||
Details | Website | 2024-08-19 | 20 | PG_MEM: A Malware Hidden in the Postgres Processes | ||
Details | Website | 2024-08-14 | 5 | Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments | ||
Details | Website | 2024-08-12 | 1 | Trickbot Banking Trojan | ||
Details | Website | 2024-08-09 | 97 | Хактивисты Head Mare: атаки на компании в РФ и Белоруссии | ||
Details | Website | 2024-07-31 | 0 | Introducing pattern-based agentless malware detection using YARA rules | Wiz Blog | ||
Details | Website | 2024-07-29 | 14 | 29th July – Threat Intelligence Report - Check Point Research | ||
Details | Website | 2024-07-25 | 18 | SeleniumGreed Cryptomining Campaign Exploiting Grid Services | Wiz Blog | ||
Details | Website | 2024-06-28 | 41 | Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer |