Common Information
Type | Value |
---|---|
Value |
xmrig |
Category | Tool |
Type | Malpedia |
Misp Type | Cluster |
Description | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-05-09 | 1 | 8220 Gang still exploits the Log4Shell for cryptomining | ||
Details | Website | 2023-05-08 | 32 | Nucleon Cyber — IOC Report | ||
Details | Website | 2023-05-04 | 12 | Avast Q1/2023 Threat Report - Avast Threat Labs | ||
Details | Website | 2023-05-02 | 100 | MS-SQL 서버 공격에 사용되는 CLR SqlShell 분석 - ASEC BLOG | ||
Details | Website | 2023-05-02 | 42 | CoinMiner (KONO DIO DA) Distributed to Linux SSH Servers - ASEC BLOG | ||
Details | Website | 2023-04-30 | 17 | Malware Analysis - amadey - edf83adc1b164b2f076bf78ca19524f7 - RedPacket Security | ||
Details | Website | 2023-04-28 | 0 | Elastic publishes 2023 Global Threat Report Spring Edition — Elastic Security Labs | ||
Details | Website | 2023-04-27 | 0 | Malware threat report reveals risk on Mac compared to Windows and Linux | ||
Details | Website | 2023-04-26 | 0 | Top Considerations for Securing AWS Lambda, part 2 - Check Point Blog | ||
Details | Website | 2023-04-24 | 42 | 리눅스 SSH 서버를 대상으로 유포 중인 코인 마이너 (KONO DIO DA) - ASEC BLOG | ||
Details | Website | 2023-04-23 | 1 | XMRig Miner - All Other Applications | ||
Details | Website | 2023-04-22 | 17 | Malware Analysis - amadey - 478b577f1c2f29eac6bf1c49bab3e999 - RedPacket Security | ||
Details | Website | 2023-04-22 | 17 | Malware Analysis - amadey - d9b10e1835acff0918213a43a4d6c29d - RedPacket Security | ||
Details | Website | 2023-04-21 | 7 | 🔹𝙰 𝙱𝚛𝚒𝚎𝚏 𝙷𝚒𝚜𝚝𝚘𝚛𝚢 𝚘𝚏 𝚃𝚑𝚎 𝙴𝚟𝚘𝚕𝚞𝚝𝚒𝚘𝚗 𝚘𝚏 𝙼𝚊𝚕𝚠𝚊𝚛𝚎🔹 | ||
Details | Website | 2023-04-21 | 29 | 8220 Gang Uses Log4Shell Vulnerability to Install CoinMiner - ASEC BLOG | ||
Details | Website | 2023-04-20 | 2 | What is Crypto Malware? Definition & Example | ||
Details | Website | 2023-04-19 | 76 | Threat Actors Rapidly Adopt Web3 IPFS Technology | ||
Details | Website | 2023-04-18 | 0 | Can Your Apple Devices Get Hacked? | McAfee Blog | ||
Details | Website | 2023-04-17 | 29 | Log4Shell 취약점 공격으로 코인 마이너를 설치하는 8220 Gang 공격 그룹 - ASEC BLOG | ||
Details | Website | 2023-04-10 | 12 | March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files - Check Point Software | ||
Details | Website | 2023-04-06 | 4 | Hackers Hate Him, Find Out Why! Honeypot Series Part 2: | ||
Details | Website | 2023-04-05 | 0 | Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques | ||
Details | Website | 2023-04-05 | 0 | Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques - RedPacket Security | ||
Details | Website | 2023-04-04 | 73 | Who Broke NPM?: Malicious Packages Flood Leading to Denial of Service | ||
Details | Website | 2023-04-01 | 55 | The Rise of FusionCore An Emerging Cybercrime Group from Europe - CYFIRMA |