mastodon.nu är en av de många oberoende Mastodon-servrar som du kan använda för att delta i Fediversen.
Mastodon.nu etablerades 2021 och är den största servern i Norden samt öppen för alla. Den drivs ideellt på ett professionellt vis och med 100% förnybar energi. Välkommen! Velkommen! Tervetuloa!

Administrerad av:

Serverstatistik:

1,6K
aktiva användare

#cryptominers

0 inlägg0 deltagare0 inlägg i dag

Malicious #VSCode extensions infect Windows with #cryptominers
The package names are:
Discord Rich Presence for VS Code - 189K Installs
Rojo – Roblox Studio Sync - 117K Installs
Solidity Compiler - 1.3K Installs
Claude AI
Golang Compiler
ChatGPT Agent for VSCode
HTML Obfuscator
Python Obfuscator for VSCode
Rust Compiler for VSCode
ExtensionTotal says it reported the malicious extensions to #Microsoft, but they are still available at the time of writing.
bleepingcomputer.com/news/secu

#Windows infected with backdoored #Linux #VM in #new phishing attacks
Using #virtualmachines to conduct attacks is nothing new, with #ransomware gangs and #cryptominers using them to stealthily perform malicious activity. However, threat actors commonly install these manually after they breach a network.
bleepingcomputer.com/news/secu #QEMU #ITSec

BleepingComputer · Windows infected with backdoored Linux VMs in new phishing attacksAv Bill Toulas

this motherfucker, cuz #AI is the new #crypto scam:

remember when during the #pandemic #shutdowns this motherfucker was lying about #cryptominers and telling everybody to pay up 2/3/5K for their graphics cards or GTFO?
cnn.com/2022/05/06/tech/nvidia

and then China and other Asian countries cracked down on miners & the prices dropped like a lead balloon?
gizmodo.com/chinas-crypto-crac

then magically miners pivoted into AI data hoovering centers?
theguardian.com/australia-news

pepperidge farms remembers...

While I may publish a more complete blog post about this later
I also sent this on twitter to make #Github aware of it quicker
However I felt that I should also publish it here.

I recently came upon this post on reddit: reddit.com/r/cybersecurity_hel

Which awakened my curiosity about this user who has quite a few repo's with multiple stars: github[.]com/AppsForDesktop

looking at their profile I noticed various repo's claiming to be desktop app for various popular websites and apps.

When I investigated these repo's in my sandboxes I discovered they installed the file: cnertucbrcaj[.]exe and performed various persistence techniques,
Adding several exclusions to defender
and uninstalling various windows security components such as MRT.

After which it of course connected to various Monero mining pools.

redditHow do I remove this malware?Hello, after my cpu goes to 80 wats on idle and my pc goes brrr, I found out that a process is creating multiple threads and closes them after...

Y'all remember #KmsdBot @larry has been working on? the cryptomining botnet that landed on one of our honeypots earlier this year?

Part three is live now, this time discussing attack traffic. The highlights:

🟠 we believe it's DDoS for hire
🔵 victims are mostly in Asia, North America, and Europe
🟠there's an interesting lack of activity in Russia and surrounding territories possibly pointing to the origins
🔵 two notable targets for FiveM and RedM, (gaming mods for GTA V and RDR2) which can tell us a lot about who its customers are.

akamai.com/blog/security-resea