The Hidden Bee infection chain, part 1: the stegano pack

Credit to Author: hasherezade| Date: Thu, 15 Aug 2019 15:26:55 +0000

The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That’s why we’re dedicating a series of posts to exploring its elements and updates made during one year of its evolution.

Categories:

Tags:

(Read more…)

The post The Hidden Bee infection chain, part 1: the stegano pack appeared first on Malwarebytes Labs.

Read more

New Mac cryptominer Malwarebytes detects as Bird Miner runs by emulating Linux

Credit to Author: Thomas Reed| Date: Thu, 20 Jun 2019 15:33:38 +0000

A new Mac cryptominer we call Bird Miner was found on pirated music production software that interestingly runs via Linux. Learn how this unique malware attempts, and ultimately fails, at using stealth techniques.

Categories:

Tags:

(Read more…)

The post New Mac cryptominer Malwarebytes detects as Bird Miner runs by emulating Linux appeared first on Malwarebytes Labs.

Read more

2019 State of Malware report: Trojans and cryptominers dominate threat landscape

Credit to Author: Wendy Zamora| Date: Wed, 23 Jan 2019 08:01:36 +0000

The 2019 State of Malware report is here. Learn what Malwarebytes Labs researchers discovered about the top global threats for businesses and consumers in 2018, and predictions for 2019.

Categories:

Tags:

(Read more…)

The post 2019 State of Malware report: Trojans and cryptominers dominate threat landscape appeared first on Malwarebytes Labs.

Read more

Mac malware combines EmPyre backdoor and XMRig miner

Credit to Author: Thomas Reed| Date: Fri, 07 Dec 2018 16:57:36 +0000

New Mac malware is using the EmPyre backdoor and the XMRig cryptominer to drain processor power—and possibly worse.

Categories:

Tags:

(Read more…)

The post Mac malware combines EmPyre backdoor and XMRig miner appeared first on Malwarebytes Labs.

Read more