#cryptominer

2026-01-19

Inside China's Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs

An analysis of Chinese hosting environments reveals over 18,000 active command-and-control (C2) servers distributed across 48 infrastructure providers. C2 infrastructure dominates malicious activity at 84%, followed by phishing at 13%. China Unicom hosts nearly half of all observed C2 servers, with Alibaba Cloud and Tencent following. A small set of malware families, including Mozi, ARL, and Cobalt Strike, accounts for most C2 activity. The infrastructure supports both cybercrime and state-linked operations, with RATs, cryptominers, and APT tooling coexisting. High-trust networks like China169 Backbone and CERNET are actively exploited. This host-centric approach exposes long-running abuse patterns and infrastructure reuse across campaigns, enabling more resilient threat detection and mitigation strategies.

Pulse ID: 6968d7975512c0a199a5bc1f
Pulse Link: otx.alienvault.com/pulse/6968d
Pulse Author: AlienVault
Created: 2026-01-15 12:03:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#China #Chinese #Cloud #CobaltStrike #CryptoMiner #CyberCrime #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #bot #AlienVault

Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2026-01-12

I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.

This is doing some weird stuff, friends.

As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.

In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.

And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.

But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.

It's an exploit file, based on this proof-of-concept [github.com/iotwar/FIVEM-POC/bl] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.

Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.

I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.

I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.

Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.

#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware

User-Agents employed both by researchers and threat actors attempting to exploit React2Shell on a honeypotSome of the malware contains Bash script commands and filenames with racially offensive slurs. These are not nice people.What a sample React2Shell exploit command looks like - a lot like Mirai and other automated wormsIn just a few hours, these four IP addresses tried to infect my honeypot dozens of times.
2025-12-15

VPS của tôi liên tục bị nhiễm cryptominer ngay sau khi cài lại Ubuntu 24.04. Bots tấn công mật khẩu root trong khoảng thời gian từ lúc khởi động đến khi chạy script bảo mật bằng Ansible. Triệu chứng: CPU 100%, tiến trình gây nghi ngờ (XMRig), nhật ký hệ thống bị xóa. Câu hỏi: Mật khẩu 50 ký tự có đủ mạnh? Làm thế nào để khóa máy chủ trong giai đoạn cài đặt? #securitytips #cryptomining #Ubuntu #VPS

Tags: #VPSan ninh #cryptominer #Ubuntu2404 #Ansible #BruteForce #Kinhnghiệmthựctế #Hethongdichvu

2025-07-18

A Linux cryptominer has been quietly spreading malware for years by hijacking legit websites with SSL certs.

🔗 hackread.com/linux-cryptominer

#CyberSecurity #Linux #Cryptominer #Malware #Crypto

Wulfy—Speaker to the machinesn_dimension@infosec.exchange
2025-07-16

Finally completed my rebuild of my #Grafana #prometheus #vps stack.

The old one was hosed in a 3 month battle with a #cryptominer
It was #docker but they kept fucking the Prometheus container.

I rebuild everything from scratch. The panels are integrated into a single JSON file, rather than in libraries.

The stack is now #podman. Rootless execution.
But I couldn't get it to get #cadvisor to feed it.
So I got a dodgy scraper script.
But even with nice, it loads the low tier VPS to 14%

#selfhosting

🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸schizanon
2025-06-17
:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2025-03-11

Cybercriminals are blackmailing YouTubers with fake copyright claims! 😱 They're threatening creators into distributing malware disguised as download links. A trojanized program installs a cryptominer. ⚠️ Be careful what you download! More info: techradar.com/pro/security/you #cybersecurity #malware #youtube #cryptominer #newz

Patryk Krawaczyńskiagresor@infosec.exchange
2025-02-19

CVE-2021-41773 oraz CVE-2021-42013 kończące się kopaniem krypto przez RedTail ( nfsec.pl/ai/6597 ) #cryptominer #botnet #redtail #linux #security #twittermigration

youtube.com/watch?v=XEDgaXtpFRM

RedPacket SecurityRedPacketSecurity
2025-01-12
cryptaxcryptax
2024-12-13

r2ai can be used over source code. Here, with Claude AI, it analyzes a sample of Linux/Rudedevil. I'm asking it to explain what it's doing with signals, and I really like its insights like "The malware likely handles this to prevent crashes when network connections fail" or "likely prevent normal process termination". Really useful to a malware analyst.

cc: @radareorg

This is the presumed decompiled source code for Linux/Rudedevil. Decompiled using decai and Claude AI.This is the explanation from Claude AI, questioned via r2ai on our file.
Wulfy—Speaker to the machinesn_dimension@infosec.exchange
2024-11-22
Kevin Karhan :verified:kkarhan@infosec.space
2024-08-06

@dirksche Klingt nach nen #CryptoMiner oder so...

Mal ps -aux bzw. btop aufgemacht?

Ggf. mal in top bzw. htop nachgucken und ggf. /home/ backuppen und das System neu installieren, weil das geht schneller?

tricia, queen of house cyberly :verified_paw: :donor:triciakickssaas@infosec.exchange
2024-05-30

New(ish) #cryptominer alert!

The #RedTail cryptominer has a new variant that exploits the recent critical PAN-OS vuln CVE-2024-3400. You may be aware of RedTail from its Log4Shell days, now it's going after at least 6 known vulnerabilities including the PAN-OS, recent Ivanti Connect Secure vulns, and ThinkPHP.

The write-up goes into a lot more technical detail and provides IoCs and mitigations. Here are the highlights:

🔐 Attackers behind this are using private cryptomining pools. It costs a loooootttt of money and time to do this. It also helps obfuscation. This can tell us some things about who is behind this.

👨‍💻 The tactics observed here mirror tactics previously seen by the Lazarus group. This nation-state theory is supported by the private pools point, but we cannot say that for certain.

🌐 The malware delivery infrastructure relies on multiple unrelated servers hosted by various ✨ legitimate ✨ hosting companies. It is robust and hard to classify as malicious without deeper examination.

Full write up includes IoCs and mitigations:
akamai.com/blog/security-resea

Incredible work Ryan Barnett Stiv Kupchik and Maxim Zavodchik. I have the coolest job in the world thanks to these folks and their awesome research.

#security #research #crypto

Spearhead bash script checks victim’s processor architecture to download the most compatible binary malware
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸schizanon
2024-05-05

1) is a shaping engine, it's used in , , , , , +, , , , , , , , , , , Engine, and other places.

2) Harfbuzz 8.0 introduces a shaper, that allows to be embedded in a file. phoronix.com/news/HarfBuzz-8.0

3) It's only a matter of time until someone embeds a in a font file.

2024-04-24

#cybersecurity #threatintel #campaign #backdoor #cryptominer

Users of eScan antivirus are advised to update ASAP to the latest version, and scan their devices for malicious files and processes.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst