Threat actors targeted are exploiting the ProxyLogon vulnerabilities in Microsoft Exchange servers to deploy Monero cryptocurrency miners. Sophos researchers reported that threat actors targeted Microsoft Exchange by exploiting ProxyLogon vulnerabilities to deploy malicious Monero cryptominer in an unusual attack. The unknown attacker is attempting to deliver a payload which is being hosted on a compromised […]
The post Monero Cryptocurrency campaign exploits ProxyLogon flaws appeared first on Security Affairs.
Read More Monero Cryptocurrency campaign exploits ProxyLogon flaws
In recent months, stimulated by the overflow of Bitcoin and Monero, various crypto mining families have become active. Based on statistics published by 360 Netlab researchers, most of them are old ones that have appeared for some time, and others are j…
Read More z0Miner Spreads Using ElasticSearch and Jenkins RCE Vulnerabilities
Crooks are exploiting BTC blockchain transactions to hide backup command-and-control (C2) server addresses for a cryptomining botnet. Security experts from Akamai have spotted a new botnet used for illicit cryptocurrency mining activities that are abusing Bitcoin (BTC) transactions to implement a backup mechanism for C2. This technique allows botnet operators to make their infrastructure resilient […]
The post A Cryptomining botnet abuses Bitcoin blockchain transactions as C2 backup mechanism appeared first on Security Affairs.
Read More A Cryptomining botnet abuses Bitcoin blockchain transactions as C2 backup mechanism