Remove Antivirus Remove Cryptocurrency Remove DNS Remove Information Security
article thumbnail

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

Security Affairs

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute backdoors and cryptocurrency miners. Avast researchers discovered and analyzed a malware campaign that exploited the update mechanism of the eScan antivirus to distribute backdoors and crypto miners.

Antivirus 101
article thumbnail

Crackonosh Monero miner made $2M after infecting 222,000 Win systems

Security Affairs

Researchers have discovered a strain of cryptocurrency-mining malware, tracked as Crackonosh, that abuses Windows Safe mode to avoid detection. . Researchers from Avast have spotted a strain of cryptocurrency miner, tracked as Crackonosh, that abuses Windows Safe mode to avoid detection. ” reads the analysis published by Avast.

Antivirus 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DirtyMoe botnet infected 100,000+ Windows systems in H1 2021

Security Affairs

The Windows botnet has been active since late 2017, it was mainly used to mine cryptocurrency, but it was also involved in DDoS attacks in 2018. Experts pointed out that the number of infected systems could be far greater because data provided by AVAST are only related to systems running their antivirus solution.

DNS 129
article thumbnail

Glupteba botnet is back after Google disrupted it in December 2021

Security Affairs

The botnet was involved in stealing users’ credentials and data, mining cryptocurrencies abusing victims’ resources, and setting up proxies to funnel other people’s internet traffic through infected machines and routers. Botnet operators use to spread the malware via cracked or pirated software and pay-per-install (PPI) schemes. .

DNS 99
article thumbnail

Chinese-speaking cybercrime gang Rocke changes tactics

Security Affairs

The malicious code is used by the hackers to deliver a Moner (XMR) crypto miner that is not detected by almost any antivirus solution. ” reads the analysis published by the security firm Anomaly. These records are accessed via normal DNS queries or DNS-over-HTTPs ( DoH ) if the DNS query fails.

article thumbnail

Security Affairs newsletter Round 364 by Pierluigi Paganini

Security Affairs

If you want to also receive for free the newsletter with the international press subscribe here.

IoT 84
article thumbnail

5 Common Phishing Attacks and How to Avoid Them?

Security Affairs

It involves DNS cache poisoning as it redirects users to a malicious site even if they enter the correct web address. Always look for HTTP secured web pages while entering your account details to save yourself from being the victim of pharming. She is a small business owner, traveler and investor of cryptocurrencies.