Common Information
Type Value
Value
xmrig
Category Tool
Type Malpedia
Misp Type Cluster
Description According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.
Details Published Attributes CTI Title
Details Website 2023-05-09 1 8220 Gang still exploits the Log4Shell for cryptomining
Details Website 2023-05-08 32 Nucleon Cyber — IOC Report
Details Website 2023-05-04 12 Avast Q1/2023 Threat Report - Avast Threat Labs
Details Website 2023-05-02 100 MS-SQL 서버 공격에 사용되는 CLR SqlShell 분석 - ASEC BLOG
Details Website 2023-05-02 42 CoinMiner (KONO DIO DA) Distributed to Linux SSH Servers - ASEC BLOG
Details Website 2023-04-30 17 Malware Analysis - amadey - edf83adc1b164b2f076bf78ca19524f7 - RedPacket Security
Details Website 2023-04-28 0 Elastic publishes 2023 Global Threat Report Spring Edition — Elastic Security Labs
Details Website 2023-04-27 0 Malware threat report reveals risk on Mac compared to Windows and Linux
Details Website 2023-04-26 0 Top Considerations for Securing AWS Lambda, part 2 - Check Point Blog
Details Website 2023-04-24 42 리눅스 SSH 서버를 대상으로 유포 중인 코인 마이너 (KONO DIO DA) - ASEC BLOG
Details Website 2023-04-23 1 XMRig Miner - All Other Applications
Details Website 2023-04-22 17 Malware Analysis - amadey - 478b577f1c2f29eac6bf1c49bab3e999 - RedPacket Security
Details Website 2023-04-22 17 Malware Analysis - amadey - d9b10e1835acff0918213a43a4d6c29d - RedPacket Security
Details Website 2023-04-21 7 🔹𝙰 𝙱𝚛𝚒𝚎𝚏 𝙷𝚒𝚜𝚝𝚘𝚛𝚢 𝚘𝚏 𝚃𝚑𝚎 𝙴𝚟𝚘𝚕𝚞𝚝𝚒𝚘𝚗 𝚘𝚏 𝙼𝚊𝚕𝚠𝚊𝚛𝚎🔹
Details Website 2023-04-21 29 8220 Gang Uses Log4Shell Vulnerability to Install CoinMiner - ASEC BLOG
Details Website 2023-04-20 2 What is Crypto Malware? Definition & Example
Details Website 2023-04-19 76 Threat Actors Rapidly Adopt Web3 IPFS Technology
Details Website 2023-04-18 0 Can Your Apple Devices Get Hacked? | McAfee Blog
Details Website 2023-04-17 29 Log4Shell 취약점 공격으로 코인 마이너를 설치하는 8220 Gang 공격 그룹 - ASEC BLOG
Details Website 2023-04-10 12 March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files - Check Point Software
Details Website 2023-04-06 4 Hackers Hate Him, Find Out Why! Honeypot Series Part 2:
Details Website 2023-04-05 0 Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques
Details Website 2023-04-05 0 Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques - RedPacket Security
Details Website 2023-04-04 73 Who Broke NPM?: Malicious Packages Flood Leading to Denial of Service
Details Website 2023-04-01 55 The Rise of FusionCore An Emerging Cybercrime Group from Europe - CYFIRMA