• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   cryptocurrency

(Almost) Hollow and Innocent: Monero Miner Remains Undetected via Process Hollowing

  • Posted on:December 12, 2019 at 5:00 am
  • Posted in:Bad Sites, Malware
  • Author:
    Trend Micro
0

Cryptocurrencies’ values are increasing again, which may explain why the number of stealthy techniques to deliver them have also increased this year. We found another campaign using process hollowing and a dropper component to evade detection and analysis, and can potentially be used for other malware payloads.

Read More
Tags: cryptocurrencycryptominerMoneroprocess holllowing

Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions

  • Posted on:September 4, 2019 at 4:57 am
  • Posted in:Exploits, Malware, Vulnerabilities
  • Author:
    Trend Micro Cyber Safety Solutions Team
0

After looking into the recent variant of the Glupteba dropper delivered from a malvertising attack, we found that the dropper downloaded two undocumented components aside from the Glupteba malware—a browser stealer and a router exploiter. Another notable feature is that the malware can now also update its command and control server address using data from bitcoin transactions.

Read More
Tags: cryptocurrencymalvertisingrouter

Miner Malware Spreads Beyond China, Uses Multiple Propagation Methods Including EternalBlue, Powershell Abuse

  • Posted on:April 12, 2019 at 4:56 am
  • Posted in:Botnets, Malware, Open source, Vulnerabilities
  • Author:
    Trend Micro
0

We analyzed a malicious Monero miner using multiple methods for propagation and infection to systems and vulnerable databases. While initially found infecting systems in China beginning of the year, the malware is expanding to other countries with more infiltration techniques like EternalBlue and PowerShell abuse.

Read More
Tags: cryptocurrencyEternalBlueMoneroPowershell

Cryptocurrency-Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine

  • Posted on:November 8, 2018 at 5:00 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

The concept of a stealthy, difficult-to-detect malware operating behind the scenes has proven to be an irresistible proposition for many threat actors, and they’re evidently adding even more techniques, as seen in a cryptocurrency miner (detected as Coinminer.Win32.MALXMR.TIAOODAM) we discovered that uses multiple obfuscation and packing as part of its routine.

Read More
Tags: cryptocurrencycryptocurrency minerWindows InstallerWiX

Cryptocurrency-Mining Bot Targets Devices With Running SSH Service via Potential Scam Site

  • Posted on:June 26, 2018 at 5:01 am
  • Posted in:Internet of Things, Malware
  • Author:
    Trend Micro
0

Our honeypot sensors, which are designed to emulate Secure Shell (SSH), Telnet, and File Transfer Protocol (FTP) services, recently detected a mining bot related to the IP address 192.158.228.46. The address has been seen to search for both SSH- and IoT-related ports, including 22, 2222, and 502. In this particular attack, however, the IP has landed on port 22, SSH service. The attack could be applicable to all servers and connected devices with a running SSH service.

Read More
Tags: botcryptocurrencycybercrimeminingSSH
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.