article thumbnail

Microsoft Defender uses Intel TDT technology against crypto-mining malware

Security Affairs

Cryptojacking malware allows threat actors to secretly mine for cryptocurrency abusing computational resources of the infected devices. “TDT leverages a rich set of performance profiling events available in Intel SoCs (system-on-a-chip) to monitor and detect malware at their final execution point (the CPU). Pierluigi Paganini.

Mining 284
article thumbnail

Cryptominer ELFs Using MSR to Boost Mining Process

Security Affairs

The Uptycs Threat Research Team recently observed Golang-based worm dropping cryptominer binaries which use the MSR (Model Specific Register) driver to disable hardware prefetchers and increase the speed of the mining process by 15%. This is done to boost the miner execution performance, thereby increasing the speed of the mining process.

Mining 280
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

The Last Watchdog

On the face, the damage caused by cryptojacking may appear to be mostly limited to consumers and website publishers who are getting their computing resources diverted to mining fresh units of Monero, Ethereum and Bytecoin on behalf of leeching attackers. You can mine them, if you have a powerful CPU. Bilogorskiy.

Mining 176
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 14

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0

Honeypots 298
article thumbnail

MaliBot Android Banking Trojan targets Spain and Italy

Security Affairs

MaliBot disguises itself as a cryptocurrency mining app named “Mining X” or “The CryptoApp”, experts also observed the malicious code masqueraded as “MySocialSecurity” and “Chrome” apps. “MaliBot listens for events using the Accessibility Service. ” continues the report.

Mining 362
article thumbnail

Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked

Security Affairs

Salt (aka SaltStack) is Python-based, open-source software for event-driven IT automation, remote task execution, and configuration management. “All traces of the crypto-mining virus were successfully eliminated yesterday, all systems remain stable, and we have not discovered any further concerns or issues on our network.

Mining 355
article thumbnail

Qilin ransomware steals credentials stored in Google Chrome

Security Affairs

After exfiltrating the stolen credentials, the attackers deleted the files and event logs to cover their tracks before deploying the ransomware. The attackers kept this GPO active for over three days, silently harvesting credentials each time users logged in. ” concludes the report.