The Hidden Bee infection chain, part 1: the stegano pack

Credit to Author: hasherezade| Date: Thu, 15 Aug 2019 15:26:55 +0000

The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That’s why we’re dedicating a series of posts to exploring its elements and updates made during one year of its evolution.

Categories:

Tags:

(Read more…)

The post The Hidden Bee infection chain, part 1: the stegano pack appeared first on Malwarebytes Labs.

Read more

Trinity Miner using open ADB port to target IoT devices

Credit to Author: Vallabh Chole| Date: Fri, 26 Jul 2019 10:08:11 +0000

In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day gadgets are becoming smarter. All these IoT devices are powered by ARM-based processor and run on android and unix operating system. These IoT devices include mobiles, smart T.V., routers, IP cameras and…

Read more

Miners snatching open source tools to strengthen their malevolent power!

Credit to Author: Anant Pulgam| Date: Fri, 26 Apr 2019 07:02:51 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack vectors for cybercriminals due to its ease of deployment and instant…

Read more

Automated Android attacks deliver “UFO” cryptominer Trojan

Credit to Author: Andrew Brandt| Date: Tue, 26 Feb 2019 16:00:23 +0000

A persistent attack against Android devices is on the rise and gaining traction with the criminals who do this sort of thing<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/zu19kgWwZIw” height=”1″ width=”1″ alt=””/>

Read more

Fake browser update seeks to compromise more MikroTik routers

Credit to Author: Malwarebytes Labs| Date: Fri, 12 Oct 2018 15:00:06 +0000

Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

Categories:

Tags:

(Read more…)

The post Fake browser update seeks to compromise more MikroTik routers appeared first on Malwarebytes Labs.

Read more

A new ransom-miner malware campaign emerging in wild!

Credit to Author: Preksha Saxena| Date: Tue, 10 Jul 2018 12:16:26 +0000

Since the past few weeks, Quick Heal Security Labs has been observing a series of interesting malware blocked at our customer end. The further analysis of the malware ‘t.exe’ revealed that the malware seems to be Trojan dropper. Interestingly, this multipurpose malware is downloading a ransomware component, a crypto-mining malware…

Read more

MIRUS – a cryptomining virus

Credit to Author: Preksha Saxena| Date: Tue, 27 Feb 2018 09:59:54 +0000

Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have analyzed a virus that infects user files with mining scripts. CoinHive is…

Read more

Deepfakes FakeApp tool (briefly) includes cryptominer

Credit to Author: Christopher Boyd| Date: Fri, 23 Feb 2018 17:20:00 +0000

We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.

Categories:

Tags:

(Read more…)

The post Deepfakes FakeApp tool (briefly) includes cryptominer appeared first on Malwarebytes Labs.

Read more