Monero Miner

Hackers Use Process Hollowing Technique to Deploy Monero Miner and Evade Defenses

Researchers observed a new crypto-mining malware campaign that uses a process hollowing method and a dropper component to deploy Monero…

5 years ago

Hackers Exploit Critical Oracle WebLogic Server Vulnerability by Hiding Malware in Certificate Files(.cer)

Hackers abuse Oracle WebLogic Server Vulnerability CVE-2019-2725 to deliver Monero Miner. The vulnerability is easily exploitable, any unauthenticated attacker with…

5 years ago

Hackers Abusing Apache CouchDB Vulnerabilities to Deploy Malware & Mining Monero Cryptocurrency

Cryptocurrency Mining Malware performing a crypto mining attack by exploiting the vulnerabilities in the popular database system. According to their global…

7 years ago

Millions of Android Users Hacked by Dangerous Drive-by Cryptomining Attack to Mine Monero

A newly discovered Cryptoming campaign called Drive-by Cryptomining targeted million of Android user to mine Monerocoins and this campaign Started…

7 years ago

Cryptocurrency Mining Smominru Botnet Infected more than 500,000 Windows Machines

Security researchers from Proofpoint detected Monero miners that spread using the infamous EternalBlue Exploit. Attackers using persistent Botnet dubbed Smominru…

7 years ago

More than 30 million people have been Affected with Biggest Cryptocurrency Mining Attack

Security researchers from Palo Alto Networks detected a large-scale cryptocurrency mining operation than last for more than 4 months. Researchers…

7 years ago

Oracle Weblogic Exploit to Deploy Monero Miner

Oracle WebLogic application server is vulnerable to cryptocurrency mining.The security researcher has found this exploit to mine monero coins in the…

7 years ago