article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 14

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0

Honeypots 296
article thumbnail

PurpleFox malware infected at least 2,000 computers in Ukraine

Security Affairs

“As part of a detailed study of the cyber threat, a study of the received samples of malicious programs was conducted, the peculiarities of the functioning of the management server infrastructure were established, and more than 2,000 affected computers were identified in the Ukrainian segment of the Internet.”

Mining 341
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks spread malware via pirated movies during COVID-19 outbreak

Security Affairs

The campaign primarily targets users in Spain and South American countries, aims to launch a coin-mining shellcode directly in memory. The in-memory DLL then injects a coin-mining code into notepad.exe through process hollowing. .” reads the Tweet published by the Microsoft Security Intelligence team.

Mining 318
article thumbnail

Cryptojacking Displaces Ransomware as Top Malware Threat

Data Breach Today

Criminals' Quest for Cryptocurrency Continues If 2017 was the year of ransomware innovation, 2018 is well on its way to being known as the year of cryptocurrency mining malware. Numerous studies have found that the most seen malware attacks today are designed for cryptojacking.

article thumbnail

New Perfctl Malware targets Linux servers in cryptomining campaign

Security Affairs

The attackers analyzed the server and deployed utilities to investigate its environment and better understand how their malware was being studied. “These may indicate crypto mining activities, especially during idle times.” In one sandbox test, a threat actor accessed the malware’s backdoor for reconnaissance purposes.

article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

The first data that emerged from the study is that threat actors continue to look at the IoT devices with increasing interest. “More and more exploits are being weaponized by cybercriminals, and infected devices are used to steal personal data and mine cryptocurrencies, on top of traditional DDoS attacks.

IoT 266
article thumbnail

Conti Ransomware Group Diaries, Part IV: Cryptocrime

Krebs on Security

Study the above systems, code, principles of work. On June 6, 2021, Conti underling “ Begemot ” pitched Stern on a scheme to rip off a bunch of people mining virtual currencies, by launching distributed denial-of-service (DDoS) attacks against a cryptocurrency mining pool. ” Stern wrote. We start ddosing.