coinminer

Zoomed In: A Look into a Coinminer Bundled with Zoom Installer

We found a coinminer bundled with the legitimate installer of video conferencing app Zoom. Users who attempt to download the installer get more than what they bargain for as they instead download the AutoIt compiled malware Trojan.Win32.MOOZ.THCCABO.

The post Zoomed In: A Look into a Coinminer Bundled with Zoom Installer appeared first on .




coinminer

Coinminer.Win64.MALXMR.TIAOODBZ

Over All Risk Rating : Low


This miner figured in the fileless GhostMiner that uses WMI Objects. GhostMiner is known to kill competing other miner payloads.

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

Read More




coinminer

Coinminer.Linux.KERBERDS.A

Over All Risk Rating : Low


This new version of KERBERDS, a known crypto-mining malware that uses an ld.so.preload-based rootkit for stealth, was seen propagating by telnet bruteforce attacks.

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

Read More




coinminer

Coinminer.Win64.MALXMR.TIAOODBZ

Over All Risk Rating : Low


This miner figured in the fileless GhostMiner that uses WMI Objects. GhostMiner is known to kill competing other miner payloads.

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

Read More




coinminer

Coinminer.Linux.KERBERDS.A

Over All Risk Rating : Low


This new version of KERBERDS, a known crypto-mining malware that uses an ld.so.preload-based rootkit for stealth, was seen propagating by telnet bruteforce attacks.

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

Read More