Tag : cryptominer

7 attack reports | 0 vulnerabilities

Attack Reports

Title Published Tags Description Number of indicators
CVE-2024-4577 Exploits in the Wild One Day After Disclosure July 11, 2024, 8:35 p.m. One of the most recent examples of this onslaught lies in a critical vulnerability discovered in PHP (versions 8.1.*, before 8.1.… 17
Turning Jenkins Into a Cryptomining Machine From an Attacker's Perspective July 5, 2024, 3:26 p.m. This report analyzes how threat actors can exploit misconfigured Jenkins servers to execute malicious Groovy scripts, leading to … 4
Examining Water Infection Routine Leading to an XMRig Cryptominer June 28, 2024, 7:39 a.m. This report details the multi-stage loading technique utilized by the threat actor Water Sigbin to deliver the PureCrypter loader… 13
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer June 27, 2024, 8:14 a.m. P2Pinfect is a sophisticated malware that utilizes a peer-to-peer botnet for command and control. Initially appearing dormant, it… 15
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit May 31, 2024, 1:41 p.m. Threat actors behind the RedTail cryptomining malware, initially reported in early 2024, have incorporated the recent Palo Alto P… 10
Distribution of Malware Under the Guise of MS Office Cracked Versions (XMRig, OrcusRAT, etc.) May 30, 2024, 7:10 a.m. The report analyzes a campaign where threat actors distribute various malware strains like RATs, coinminers, and loaders disguise… 11
Malware (XMRig, OrcusRAT, etc.) disguised as MS Office crack May 10, 2024, 1:45 p.m. The report details an ongoing malware campaign targeting South Korean users, which disguises malicious payloads as cracked versio… 12