Remove 2017 Remove Antivirus Remove Cryptocurrency Remove Passwords
article thumbnail

DirtyMoe botnet infected 100,000+ Windows systems in H1 2021

Security Affairs

The Windows botnet has been active since late 2017, it was mainly used to mine cryptocurrency, but it was also involved in DDoS attacks in 2018. “Recently, a new infection vector that cracks Windows machines through SMB password brute force is on the rise” reads the analysis published by AVAST.

DNS 129
article thumbnail

StripedFly: Perennially flying under the radar

SecureList

Introduction It’s just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. Subsequent analysis revealed earlier instances of suspicious code dating back to 2017.

Malware 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

To bypass antivirus systems, hackers send out malicious emails in non-working hours with delayed activation. The first half of 2019 saw a 10-fold increase in the number of password-protected objects, such as documents and archive files, being used to deliver malware. More than 80% of all malicious files were disguised as .zip

article thumbnail

LemonDuck no longer settles for breadcrumbs

Malwarebytes

Trojan.LemonDuck uses several methods for the initial infection and to propagate across networks: Malspam: the email typically contains two files: a Word document exploiting CVE-2017-8570 and a zip archive with a malicious JavaScript. The earliest documentation of LemonDuck was from its cryptocurrency campaigns in May 2019.

Malware 87
article thumbnail

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware

Security Affairs

Latin American Javali trojan weaponizing Avira antivirus legitimate injector to implant malware. Javali trojan is active since November 2017 and targets users of financial and banking organizations geolocated in Brazil and Mexico. Background of Latin American Trojans.

Antivirus 121
article thumbnail

IT threat evolution Q3 2023

SecureList

The attackers use the reverse shell to deploy a Bash stealer that collects data such as system information, browsing history, saved passwords, cryptocurrency wallet files and credentials for cloud services (AWS, Google Cloud, Oracle Cloud Infrastructure, Azure). Instead, it tried to exploit the CVE-2017-0199 vulnerability.

Malware 91
article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

used the password 225948. Constella finds the same password tied to webmaster@stairwell.ru (225948) was used by the email address 3k@xakep.ru , which Intel 471 says was registered to more than a dozen NeroWolfe accounts across just as many Russian cybercrime forums between 2011 and 2015. and admin@stairwell.ru