Common Information
Type Value
Value
xmrig
Category Tool
Type Malpedia
Misp Type Cluster
Description According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.
Details Published Attributes CTI Title
Details Website 2024-09-04 21 Unpacking the unpleasant FIN7 gift: PackXOR
Details Website 2024-09-04 2 XMRig 코인 마이너를 유포하는 BMOF(Binary Managed Object File) (MDS 제품 탐지) - ASEC
Details Website 2024-09-04 2 Binary Managed Object File (BMOF) Distributing XMRig CoinMiner (Detected by MDS) - ASEC
Details Website 2024-09-03 5 Iran Cyber Threat Resource Center: How to Navigate Amid Geopolitical Conflicts and Tensions
Details Website 2024-09-03 0 Cryptojacking facilitated by critical Atlassian Confluence exploit
Details Website 2024-09-03 7 Iran Cyber Threat Resource Center: How to Navigate Amid Geopolitical Conflicts and Tensions
Details Website 2024-09-03 2 Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks
Details Website 2024-09-02 98 Head Mare: adventures of a unicorn in Russia and Belarus
Details Website 2024-09-02 98 Head Mare hacktivists: attacks on companies in Russia and Belarus
Details Website 2024-09-02 1 Atlassian Confluence 漏洞被利用于加密货币挖矿活动-安全客 - 安全资讯平台
Details Website 2024-08-30 1 Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns
Details Website 2024-08-30 1 Threat actors exploit Atlassian Confluence bug in cryptomining campaigns
Details Website 2024-08-29 13 What kind of summer has it been?
Details Website 2024-08-29 1 攻击者利用严重 Atlassian Confluence 漏洞进行加密劫持-安全客 - 安全资讯平台
Details Website 2024-08-28 11 Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem
Details Website 2024-08-22 2 New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining
Details Website 2024-08-20 21 The gift that keeps on giving: A new opportunistic Log4j campaign | Datadog Security Labs
Details Website 2024-08-19 20 PG_MEM: A Malware Hidden in the Postgres Processes
Details Website 2024-08-14 5 Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments
Details Website 2024-08-12 1 Trickbot Banking Trojan
Details Website 2024-08-09 97 Хактивисты Head Mare: атаки на компании в РФ и Белоруссии
Details Website 2024-07-31 0 Introducing pattern-based agentless malware detection using YARA rules | Wiz Blog
Details Website 2024-07-29 14 29th July – Threat Intelligence Report - Check Point Research
Details Website 2024-07-25 18 SeleniumGreed Cryptomining Campaign Exploiting Grid Services | Wiz Blog
Details Website 2024-06-28 41 Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer