Common Information
Type Value
Value
xmrig
Category Tool
Type Malpedia
Misp Type Cluster
Description According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.
Details Published Attributes CTI Title
Details Website 2023-11-08 0 Key Takeaways from the 2023 Kubernetes Security Report | Wiz Blog
Details Website 2023-11-02 1 Threat Intelligence Feeds, QR Codes, New Extractors, and More
Details Website 2023-10-25 94 A pirated program downloaded from a torrent site infected hundreds of thousands of users
Details Website 2023-10-18 2 Qubitstrike Malware Hits Jupyter Notebooks for Cryptojacking and Cloud Data
Details Website 2023-10-18 4 Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign
Details Website 2023-10-18 69 Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks - Cado Security | Cloud Forensics & Incident Response
Details Website 2023-10-11 0 Understanding Cloud Workload Protection (CWP) In Under 10 Minutes
Details Website 2023-09-27 0 Unveiling Sysdig Secure Risks and Attack Path Analysis: Visualizing and Prioritizing Cloud Security Risks – Sysdig
Details Website 2023-09-25 16 CoinMiner Distribution Process within Infiltrated Systems (Detected by EDR) - ASEC BLOG
Details Website 2023-09-21 0 Unveiling Mac Malware Mysteries: A Journey with Jamf Threat Labs
Details Website 2023-09-20 16 침해당한 시스템의 코인마이너 유포 과정(EDR 탐지) - ASEC BLOG
Details Website 2023-09-08 9 Hoze shell script dropped along with XMRig miners on misconfigured SSH Servers by Brute Forcing | Threat Intelligence | CloudSEK
Details Website 2023-09-06 64 Summer '23 Cryptomining Attacks: Analysis + Recommendations | Wiz Blog
Details Website 2023-09-06 38 Scarleteel 2.0 and the MITRE ATT&CK framework – Sysdig
Details Website 2023-08-30 10 Cryptocurrency Miner Masquerading as GCC Compiler Found in NPM Package
Details Website 2023-08-29 0 Cryptocurrency Malware: An Ever-Adapting Threat
Details Website 2023-08-28 14 DreamBus Botnet Resurfaces, Targets RocketMQ vulnerability | Official Juniper Networks Blogs
Details Website 2023-08-25 34 Analysis of MS-SQL Server Proxyjacking Cases - ASEC BLOG
Details Website 2023-08-17 60 LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab  – Sysdig
Details Website 2023-08-10 15 Avast Q2/2023 Threat Report - Avast Threat Labs
Details Website 2023-08-08 8 Kubernetes Exposed: One Yaml away from Disaster
Details Website 2023-08-08 0 Thailand’s Fifth Largest Bank Breached, K0LzSec Claims Krungsri Data Breach
Details Website 2023-07-14 1 มัลแวร์ตัวใหม่ PyLoose Linux สามารถขุด crypto โดยตรงจากหน่วยความจำ
Details Website 2023-07-14 17 PyLoose: A new fileless malware targeting cloud workloads
Details Website 2023-07-13 53 Old Blackmoon Trojan, NEW Monetization Approach | Rapid7 Blog