Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

Search Results for: XMRig

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
Cyber Security News

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

May 20, 2025 CybersecurityNews

Cybersecurity experts have identified a new Linux cryptojacking campaign called RedisRaider, which targets publicly accessible Redis servers to deploy cryptocurrency miners. This threat impacts Linux server infrastructures and Redis instances globally. #Redis #LinuxServers…

Read More
Threat Research

Fileless XMRig-C3 Cryptominer Targets PostgreSQL Servers | Wiz Blog

April 4, 2025April 25, 2025 WizBlog

Wiz Threat Research has identified an ongoing campaign by the threat actor JINX-0126, targeting poorly configured and publicly exposed PostgreSQL servers. By exploiting weak login

Read More
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
Cyber Security News

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

March 20, 2025 CybersecurityNews

…

Read More
Phishing Scam Targets Job Seekers with XMRig Cryptominer
Cyber Security News

Phishing Scam Targets Job Seekers with XMRig Cryptominer

January 11, 2025January 25, 2025 Cyware

…

Read More
Threat Research

Binary Managed Object File (BMOF) Distributing XMRig CoinMiner Detected by MDS

September 10, 2024 Ahnlab

…

Read More
Threat Research

Examining Water Sigbin’s Infection Routine Leading to an XMRig Cryptominer

June 28, 2024 TrendMicro

We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner….

Read More
Threat Research

XMRig CoinMiner Installed through Game Emulator

May 30, 2024 Ahnlab

AhnLab SEcurity intelligence Center (ASEC) recently found that XMRig CoinMiner is being distributed through a game emulator. Similar cases were introduced in previous ASEC Blog posts multiple times as shown below. 1. Distribution Channel The CoinMiner was found to be distributed on a website that provides a game emulator for a well-known…

Read More
Threat Research

Distribution of Malware Under the Guise of MS Office Cracked Versions (XMRig, OrcusRAT, etc.) – ASEC BLOG

May 30, 2024 Securonix

Through a post titled β€œOrcus RAT Being Distributed Disguised as a Hangul Word Processor Crack” [1], AhnLab SEcurity intelligence Center (ASEC) previously disclosed an attack

Read More
Threat Research

Inside Our Discovery of the Log4j Campaign and Its XMRig Malware

May 17, 2024 Securonix

The Uptycs Threat Research Team has uncovered a large-scale, ongoing operation within the Log4j campaign. Initially detected within our honeypot collection, upon discovery, the team

Read More
Threat Research

New Sysrv Botnet Variant Makes Use of Google Subdomain to Spread XMRig Miner

March 21, 2024March 22, 2024 admin

Sysrv is a well-documented botnet first identified in 2020, with the main payload being a worm written in Golang. It drops a cryptominer onto infected

Read More
Threat Research

BitRAT and XMRig CoinMiner Being Distributed via Windows License Verification Tool – ASEC BLOG

August 16, 2022May 24, 2024 Securonix

The ASEC analysis team has recently discovered the distribution of BitRAT and XMRig CoinMiner disguised as a Windows license verification tool. As introduced in previous

Read More
CoinMiner Attacks Exploiting GeoServer Vulnerability
Threat Research

CoinMiner Attacks Exploiting GeoServer Vulnerability

July 9, 2025 Ahnlab

The unpatched GeoServer vulnerability CVE-2024-36401 continues to be exploited by threat actors to install malware such as NetCat and XMRig CoinMiner, with confirmed cases in South Korea. Attackers use PowerShell and Bash scripts to deploy these malicious tools, enabling remote control and cryptocurrency mining. #GeoServer #CVE202436401 #NetCat #XMRig…

Read More
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
Threat Research

Digging Gold with a Spoon – Resurgence of Monero-mining Malware

July 8, 2025 GDataSecurity

A recent resurgence of XMRig cryptominer malware was observed in April 2025, coinciding with a rally in Monero cryptocurrency prices and a major bitcoin theft converted to Monero. The malware employs multi-staged attacks utilizing LOLBAS techniques and Windows built-in tools to achieve persistence and evade detection. #XMRig #Monero #notif_su

Read More
Threat Research | Weekly Recap [06 Jul 2025]
Cyber Security News Daily Recap

Threat Research | Weekly Recap [06 Jul 2025]

July 7, 2025July 7, 2025 admin

This week’s cybersecurity recap highlights critical vulnerabilities such as CVE-2025-5777 and CVE-2025-20309 affecting Citrix and Cisco, which are actively exploited by threat actors like APT28 and MuddyWater. Emerging malware campaigns include sophisticated botnets like Flodrix and advanced evasion techniques like Shellter and steganography. #CitrixBleed #MuddyWater

Read More
Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
Cyber Security News

Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

July 5, 2025 CybersecurityNews

Threat actors are exploiting exposed JDWP interfaces in Java applications to execute remote code, deploy cryptocurrency miners, and establish persistence. They also leverage malicious botnets like Hpingbot to carry out DDoS attacks, targeting systems via weak SSH configurations. #JDWP #Hpingbot…

Read More

Posts pagination

1 2 … 19 Next

What are you looking for ?

  • πŸ–₯️ [ D A S H B O A R D ]
  • πŸ•΅οΈβ€β™‚οΈ Threat Research
  • πŸ“° Security News
  • 🚨 Attack & Data Breach
  • πŸ›‘ Ransomware Monitor
  • πŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • πŸ“Ί Youtube Overview
  • πŸ” Google Cybersecurity
  • πŸ“’ Telegram Notification
  • πŸ“° News Daily Recap
  • πŸ“° Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian
Support this website

Website Disclaimer