Common Information
Type | Value |
---|---|
Value |
xmrig |
Category | Tool |
Type | Malpedia |
Misp Type | Cluster |
Description | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-11-08 | 0 | Key Takeaways from the 2023 Kubernetes Security Report | Wiz Blog | ||
Details | Website | 2023-11-02 | 1 | Threat Intelligence Feeds, QR Codes, New Extractors, and More | ||
Details | Website | 2023-10-25 | 94 | A pirated program downloaded from a torrent site infected hundreds of thousands of users | ||
Details | Website | 2023-10-18 | 2 | Qubitstrike Malware Hits Jupyter Notebooks for Cryptojacking and Cloud Data | ||
Details | Website | 2023-10-18 | 4 | Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign | ||
Details | Website | 2023-10-18 | 69 | Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks - Cado Security | Cloud Forensics & Incident Response | ||
Details | Website | 2023-10-11 | 0 | Understanding Cloud Workload Protection (CWP) In Under 10 Minutes | ||
Details | Website | 2023-09-27 | 0 | Unveiling Sysdig Secure Risks and Attack Path Analysis: Visualizing and Prioritizing Cloud Security Risks – Sysdig | ||
Details | Website | 2023-09-25 | 16 | CoinMiner Distribution Process within Infiltrated Systems (Detected by EDR) - ASEC BLOG | ||
Details | Website | 2023-09-21 | 0 | Unveiling Mac Malware Mysteries: A Journey with Jamf Threat Labs | ||
Details | Website | 2023-09-20 | 16 | 침해당한 시스템의 코인마이너 유포 과정(EDR 탐지) - ASEC BLOG | ||
Details | Website | 2023-09-08 | 9 | Hoze shell script dropped along with XMRig miners on misconfigured SSH Servers by Brute Forcing | Threat Intelligence | CloudSEK | ||
Details | Website | 2023-09-06 | 64 | Summer '23 Cryptomining Attacks: Analysis + Recommendations | Wiz Blog | ||
Details | Website | 2023-09-06 | 38 | Scarleteel 2.0 and the MITRE ATT&CK framework – Sysdig | ||
Details | Website | 2023-08-30 | 10 | Cryptocurrency Miner Masquerading as GCC Compiler Found in NPM Package | ||
Details | Website | 2023-08-29 | 0 | Cryptocurrency Malware: An Ever-Adapting Threat | ||
Details | Website | 2023-08-28 | 14 | DreamBus Botnet Resurfaces, Targets RocketMQ vulnerability | Official Juniper Networks Blogs | ||
Details | Website | 2023-08-25 | 34 | Analysis of MS-SQL Server Proxyjacking Cases - ASEC BLOG | ||
Details | Website | 2023-08-17 | 60 | LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab – Sysdig | ||
Details | Website | 2023-08-10 | 15 | Avast Q2/2023 Threat Report - Avast Threat Labs | ||
Details | Website | 2023-08-08 | 8 | Kubernetes Exposed: One Yaml away from Disaster | ||
Details | Website | 2023-08-08 | 0 | Thailand’s Fifth Largest Bank Breached, K0LzSec Claims Krungsri Data Breach | ||
Details | Website | 2023-07-14 | 1 | มัลแวร์ตัวใหม่ PyLoose Linux สามารถขุด crypto โดยตรงจากหน่วยความจำ | ||
Details | Website | 2023-07-14 | 17 | PyLoose: A new fileless malware targeting cloud workloads | ||
Details | Website | 2023-07-13 | 53 | Old Blackmoon Trojan, NEW Monetization Approach | Rapid7 Blog |