article thumbnail

Microsoft Defender uses Intel TDT technology against crypto-mining malware

Security Affairs

Cryptojacking malware allows threat actors to secretly mine for cryptocurrency abusing computational resources of the infected devices. “TDT leverages a rich set of performance profiling events available in Intel SoCs (system-on-a-chip) to monitor and detect malware at their final execution point (the CPU). Pierluigi Paganini.

Mining 280
article thumbnail

Cryptominer ELFs Using MSR to Boost Mining Process

Security Affairs

The Uptycs Threat Research Team recently observed Golang-based worm dropping cryptominer binaries which use the MSR (Model Specific Register) driver to disable hardware prefetchers and increase the speed of the mining process by 15%. This is done to boost the miner execution performance, thereby increasing the speed of the mining process.

Mining 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

The Last Watchdog

On the face, the damage caused by cryptojacking may appear to be mostly limited to consumers and website publishers who are getting their computing resources diverted to mining fresh units of Monero, Ethereum and Bytecoin on behalf of leeching attackers. You can mine them, if you have a powerful CPU. Bilogorskiy.

Mining 176
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 14

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0

Honeypots 293
article thumbnail

MaliBot Android Banking Trojan targets Spain and Italy

Security Affairs

MaliBot disguises itself as a cryptocurrency mining app named “Mining X” or “The CryptoApp”, experts also observed the malicious code masqueraded as “MySocialSecurity” and “Chrome” apps. “MaliBot listens for events using the Accessibility Service. ” continues the report.

Mining 362
article thumbnail

Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked

Security Affairs

Salt (aka SaltStack) is Python-based, open-source software for event-driven IT automation, remote task execution, and configuration management. “All traces of the crypto-mining virus were successfully eliminated yesterday, all systems remain stable, and we have not discovered any further concerns or issues on our network.

Mining 352
article thumbnail

Bitcoin down: 51% attack? No, put the blame on Elon Musk

Security Affairs

We have a long-debated about the possibility that the Bitcoin price could be influenced by threat actors through 51% attacks , but recent events demonstrate that it could be easier to manipulate its value. Tesla representatives have yet to provide any comment on the event. Tesla did not immediately respond to a request for comment.”

Mining 233