#cryptoMiner

๐Ÿงฟ๐Ÿชฌ๐Ÿ„๐ŸŒˆ๐ŸŽฎ๐Ÿ’ป๐Ÿšฒ๐Ÿฅ“๐ŸŽƒ๐Ÿ’€๐Ÿด๐Ÿ›ป๐Ÿ‡บ๐Ÿ‡ธschizanon
2025-06-17
nemoโ„ข ๐Ÿ‡บ๐Ÿ‡ฆnemo@mas.to
2025-03-11

Cybercriminals are blackmailing YouTubers with fake copyright claims! ๐Ÿ˜ฑ They're threatening creators into distributing malware disguised as download links. A trojanized program installs a cryptominer. โš ๏ธ Be careful what you download! More info: techradar.com/pro/security/you #cybersecurity #malware #youtube #cryptominer #newz

Patryk Krawaczyล„skiagresor@infosec.exchange
2025-02-19

CVE-2021-41773 oraz CVE-2021-42013 koล„czฤ…ce siฤ™ kopaniem krypto przez RedTail ( nfsec.pl/ai/6597 ) #cryptominer #botnet #redtail #linux #security #twittermigration

youtube.com/watch?v=XEDgaXtpFRM

RedPacket SecurityRedPacketSecurity
2025-01-12
cryptaxcryptax
2024-12-13

r2ai can be used over source code. Here, with Claude AI, it analyzes a sample of Linux/Rudedevil. I'm asking it to explain what it's doing with signals, and I really like its insights like "The malware likely handles this to prevent crashes when network connections fail" or "likely prevent normal process termination". Really useful to a malware analyst.

cc: @radareorg

This is the presumed decompiled source code for Linux/Rudedevil. Decompiled using decai and Claude AI.This is the explanation from Claude AI, questioned via r2ai on our file.
2024-12-06

Ein Krypto-Miner wurde in einigen Versionen des Pip-Pakets ultralytics gefunden. Betroffen sind die Versionen v8.3.41 und v8.3.42 des ultralytics pip-Pakets auf Mac und Linux.
Updaten!
blog.comfy.org/comfyui-stateme
#DASS #DassNews #ultralytics #cryptominer

ComfyUl statement on the Ultralytics crypto miner situation. A crypto miner was found in some versions of the ultralytics pip package.
Kevin Karhan :verified:kkarhan@infosec.space
2024-08-06

@dirksche Klingt nach nen #CryptoMiner oder so...

Mal ps -aux bzw. btop aufgemacht?

Ggf. mal in top bzw. htop nachgucken und ggf. /home/ backuppen und das System neu installieren, weil das geht schneller?

tricia, queen of house cyberly :verified_paw: :donor:triciakickssaas@infosec.exchange
2024-05-30

New(ish) #cryptominer alert!

The #RedTail cryptominer has a new variant that exploits the recent critical PAN-OS vuln CVE-2024-3400. You may be aware of RedTail from its Log4Shell days, now it's going after at least 6 known vulnerabilities including the PAN-OS, recent Ivanti Connect Secure vulns, and ThinkPHP.

The write-up goes into a lot more technical detail and provides IoCs and mitigations. Here are the highlights:

๐Ÿ” Attackers behind this are using private cryptomining pools. It costs a loooootttt of money and time to do this. It also helps obfuscation. This can tell us some things about who is behind this.

๐Ÿ‘จโ€๐Ÿ’ป The tactics observed here mirror tactics previously seen by the Lazarus group. This nation-state theory is supported by the private pools point, but we cannot say that for certain.

๐ŸŒ The malware delivery infrastructure relies on multiple unrelated servers hosted by various โœจ legitimate โœจ hosting companies. It is robust and hard to classify as malicious without deeper examination.

Full write up includes IoCs and mitigations:
akamai.com/blog/security-resea

Incredible work Ryan Barnett Stiv Kupchik and Maxim Zavodchik. I have the coolest job in the world thanks to these folks and their awesome research.

#security #research #crypto

Spearhead bash script checks victimโ€™s processor architecture to download the most compatible binary malware
๐Ÿงฟ๐Ÿชฌ๐Ÿ„๐ŸŒˆ๐ŸŽฎ๐Ÿ’ป๐Ÿšฒ๐Ÿฅ“๐ŸŽƒ๐Ÿ’€๐Ÿด๐Ÿ›ป๐Ÿ‡บ๐Ÿ‡ธschizanon
2024-05-05

1) is a shaping engine, it's used in , , , , , +, , , , , , , , , , , Engine, and other places.

2) Harfbuzz 8.0 introduces a shaper, that allows to be embedded in a file. phoronix.com/news/HarfBuzz-8.0

3) It's only a matter of time until someone embeds a in a font file.

2024-04-24

#cybersecurity #threatintel #campaign #backdoor #cryptominer

Users of eScan antivirus are advised to update ASAP to the latest version, and scan their devices for malicious files and processes.

2024-04-24

#cybersecurity #threatintel #campaign #backdoor #cryptominer

The campaign is believed to be state-sponsored. The attack works by substituting eScan antivirus software updates with a malicious version. The issue was unnoticed for at least 5 years, but has been fixed as of July 31, 2023.

2024-04-24

Security researchers have revealed a malware campaign that exploits the software update mechanism of eScan antivirus to distribute backdoors and cryptocurrency miners.

#cybersecurity #threatintel #campaign #backdoor #cryptominer

thehackernews.com/2024/04/esca

2024-04-09

Sysdig provides a threat actor profile on RUBYCARP, described as a Romanian financially motivated threat actor group actively running a botnet for the past 10 years. They have some crossover with the Outlaw APT group. Their payloads are geared towards cryptomining, DDoS, and Phishing. Initial access includes exploitation of CVE-2021-3129 (9.8 critical, disclosed 12 January 2021, in KEV Catalog, Laravel RCE). Sysdig also IRC talks communication and group hierarchy. IOC for crypto mining pools and various IP/domains scattered throughout article.๐Ÿ”— sysdig.com/blog/rubycarp-roman

#RUBYCARP #cybercrime #cryptominer #threatintel #IOC #CVE_2021_3129

Hayl Powellhmxkcl
2023-11-16

Bee Network is the world's largest interactive platform. Join by invitation and earn daily with one click for 24hrs! Use my invitation code to join and get 1 Bee for free: hmxkcl. Start earning & getting $BEE for affiliate Airdrops along with the mining, task rewards, and of course the earned from the ๐Ÿ‘€โค๏ธ๐Ÿ˜๐Ÿ˜ Here's the link: j.bee.com/s?a=hmxkcl ๐Ÿ‘‹๐Ÿป๐Ÿคณ๐Ÿป

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst