• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cryptocurrency mining campaign hits linux users with go based chaos malware

Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware

You are here: Home / General Cyber Security News / Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware
December 12, 2022

A cryptocurrency mining attack focusing on the Linux working program also associated the use of an open up resource remote entry trojan (RAT) dubbed CHAOS.

The danger, which was noticed by Pattern Micro in November 2022, stays practically unchanged in all other facets, which include when it will come to terminating competing malware, security software package, and deploying the Monero (XMR) cryptocurrency miner.

“The malware achieves its persistence by altering /and so forth/crontab file, a UNIX job scheduler that, in this scenario, downloads itself each and every 10 minutes from Pastebin,” scientists David Fiser and Alfredo Oliveira said.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

This step is succeeded by downloading next-stage payloads that consist of the XMRig miner and the Go-centered CHAOS RAT.

The cybersecurity business explained that the main downloader script and even more payloads are hosted in various spots to make confident that the campaign remains active and new bacterial infections continue on to occur.

The CHAOS RAT, when downloaded and released, transmits comprehensive program metadata to a remote server, whilst also coming with capabilities to carry out file operations, take screenshots, shutdown and restart the computer, and open up arbitrary URLs.

“On the surface, the incorporation of a RAT into the infection routine of a cryptocurrency mining malware may seem to be relatively small,” the researchers claimed.

“However, provided the tool’s array of capabilities and the reality that this evolution exhibits that cloud-centered danger actors are nonetheless evolving their strategies, it is critical that the two companies and people remain further vigilant when it arrives to security.”

Located this write-up fascinating? Adhere to us on Twitter  and LinkedIn to examine additional special content material we post.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «telstra blames it blunder for leak of 130,000 customer records Telstra blames IT blunder for leak of 130,000 customer records
Next Post: Google Adds Passkey Support to Chrome for Windows, macOS and Android google adds passkey support to chrome for windows, macos and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.