Source |
TrendLabs Security |
Identifiant |
1349574 |
Date de publication |
2019-09-19 12:14:56 (vue: 2019-09-20 19:00:05) |
Titre |
Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads |
Texte |
By Carl Maverick Pascual (Threats Analyst) Cybercriminals continue to use cryptocurrency-mining malware to abuse computing resources for profit. As early as 2017, we have also observed how they have applied fileless techniques to make detection and monitoring more difficult. On August 2, we observed a fileless cryptocurrency-mining malware, dubbed GhostMiner, that weaponizes Windows management instrumentation...
|
Envoyé |
Oui |
Condensat |
2017 abuse also analyst appeared applied august carl computing continue cryptocurrency cybercriminals detection difficult dubbed early fileless first ghostminer have how instrumentation kills make malware management maverick miner mining monitoring more objects observed other pascual payloads post profit resources techniques threats use weaponizes windows wmi |
Tags |
Malware
|
Stories |
|
Notes |
|
Move |
|