Not just a miner, the malware also sets up a hidden default account with system administrator privileges, to be used for re-infection and further attacks. The ShadowBrokers’ release of a trove of ...
Threat actors are exploiting a misconfiguration in Selenium Grid, a popular web app testing framework, to deploy a modified XMRig tool for mining Monero cryptocurrency. Selenium Grid is open-source ...
Security researchers have spotted a new multi-stage attack campaign using NSA exploits to infect victim machines with Monero mining malware. The attack begins by scanning for vulnerable servers: ...
At least 5% of all the Monero cryptocurrency currently in circulation has been mined using malware, and about 2% of the total daily hashrate comes from devices infected with cryptocurrency-mining ...
The group behind the VenusLocker ransomware have switched to cryptocurrency mining Monero. Criminals behind the VenusLocker ransomware have switched to cryptocurrency mining in their latest campaign ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results