cryptocurrency mining

Tech Optimizer
April 17, 2025
Bitdefender Total Security offers comprehensive antivirus protection, a VPN with a daily limit of 200 MB, and specific protections for cryptocurrency mining. The software includes multi-layered antivirus protection, real-time Advanced Threat Detection, Ransomware Remediation, a firewall, and an anti-spam feature. Performance testing shows minimal impact on speed, with quick scans completing in minutes and full scans taking about 30 minutes. Additional features include a secure browser for financial transactions, a virtual keyboard, a trial password manager, webcam and microphone privacy controls, and PC optimization tools. The user interface is designed for ease of use, with a customizable dashboard and intuitive navigation. Support options include phone, chat, and email, with quick transitions to live agents. Bitdefender typically retails at .99 annually, with competitors offering lower introductory prices.
Tech Optimizer
April 2, 2025
Over 1,500 PostgreSQL instances exposed to the internet have been targeted by a cryptocurrency mining malware campaign called JINX-0126. Attackers exploit weak credentials to access PostgreSQL servers and use the "COPY ... FROM PROGRAM SQL" command for arbitrary command execution. They deploy a shell script to terminate existing cryptominers and deliver the pg_core binary. A Golang binary, disguised as the PostgreSQL multi-user database server, is then downloaded to establish persistence and escalate privileges, leading to the execution of the latest XMRig cryptominer variant. JINX-0126 employs advanced tactics, including unique hashes for binaries and fileless miner payload execution, to evade detection by cloud workload protection platforms.
Winsage
March 6, 2025
A malware campaign has emerged, exploiting the popularity of Windows Packet Divert drivers. The SilentCryptoMiner malware, disguised as legitimate tools, has affected over 2,000 victims in Russia. Cybercriminals manipulate YouTubers to share malicious links, with one YouTuber having 60,000 subscribers attracting over 400,000 views on infected videos. Compromised files were hosted on gitrok[.]com, with over 40,000 downloads. Attackers issue copyright strikes to content creators, threatening channel shutdowns to propagate malware. The infection begins with a modified script that executes an executable via PowerShell, using a Python-crafted loader to fetch the payload. SilentCryptoMiner, based on XMRig, mines various cryptocurrencies stealthily, employing techniques to evade detection and dynamically adjust its behavior. This campaign highlights the evolving tactics of cybercriminals, leveraging demand for bypass tools to distribute malware. Users are advised to be cautious when downloading tools from untrusted sources.
TrendTechie
February 19, 2025
A campaign known as StaryDobry, identified by Kaspersky Lab, began on the last day of 2024, targeting users of popular torrent trackers during the holiday season. The attack affected users globally, particularly in Russia, Belarus, Kazakhstan, Germany, and Brazil. Cybercriminals distributed trojanized versions of popular games like BeamNG.drive and Garry’s Mod, which contained hidden cryptocurrency mining software. The malware used in this campaign included XMRig, designed for mining Monero (XMR) without user consent. The installation process involved multiple layers of evasion, including checking for debugging tools and system parameters. The malware extracted files using RAR libraries, sent system fingerprints to a command server, and launched a loader that disguised itself as system files. XMRig operated in the background, utilizing the victim's CPU for mining while avoiding detection by terminating itself if analysis tools were present. The attack poses risks not only to individual users but also to corporate systems through compromised devices. No information is available about the attackers behind this campaign.
Winsage
November 8, 2024
Researchers have identified a new threat campaign called SteelFox, which uses counterfeit software activators and cracks to infiltrate Windows systems. The campaign deploys a vulnerable driver, information-stealing malware, and a cryptocurrency miner, compromising sensitive data and exploiting system resources for illicit mining. Victims are reported globally, including regions from Brazil to China, affecting users of commercial software like Foxit PDF Editor, JetBrains, and AutoCAD. Cybercriminals continue to advertise these fake software solutions, increasing the potential for further infections.
Tech Optimizer
October 13, 2024
Recent findings indicate significant vulnerabilities in PostgreSQL due to misconfigurations that can enable unauthorized shell command execution on the operating system. The COPY SQL command combined with the pg_execute_server_program role facilitates these vulnerabilities, especially when PostgreSQL services are exposed via Kubernetes ingress. PostgreSQL is the third most targeted application among Google customers, with weak passwords being a common vector for initial access in 41% of observed compromises. Misconfigured instances, particularly manual deployments, often lack proper authentication controls, user roles, and permissions. The use of “trust” authentication allows users from any IP to connect without a password, potentially granting superuser privileges. This vulnerability can be exploited by attackers to execute malicious commands, such as downloading cryptocurrency mining software. CrowdStrike's Falcon platform provides protection against threats targeting PostgreSQL by detecting and preventing malicious activities. Best practices for securing PostgreSQL include using strong passwords, securing configuration files, enabling SSL/TLS, auditing user roles, and adopting a Zero Trust approach to access control.
Tech Optimizer
August 26, 2024
PG_MEM malware poses a significant security threat to over 800,000 PostgreSQL databases protected by weak passwords, enabling unauthorized cryptocurrency mining. Attackers use brute-force techniques to guess database credentials, establish a superuser role for continued access, and gather system information to download cryptomining software and other malicious payloads. They modify system configuration files, create cron jobs for persistence, and relocate logs to evade detection. Recommendations for organizations include strengthening threat monitoring and authentication protocols, implementing advanced threat detection tools, and isolating databases from broader network access.
Search