• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new malware loader 'verblecon' infects hacked pcs with cryptocurrency miners

New Malware Loader ‘Verblecon’ Infects Hacked PCs with Cryptocurrency Miners

You are here: Home / General Cyber Security News / New Malware Loader ‘Verblecon’ Infects Hacked PCs with Cryptocurrency Miners
March 29, 2022

An unidentified threat actor has been noticed using a “elaborate and impressive” malware loader with the ultimate goal of deploying cryptocurrency miners on compromised techniques and potentially facilitating the theft of Discord tokens.

“The proof identified on victim networks appears to point out that the goal of the attacker was to set up cryptocurrency mining software package on victim devices,” researchers from the Symantec Danger Hunter Workforce, element of Broadcom Computer software, reported in a report shared with The Hacker Information.

Automatic GitHub Backups

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“This would look to be a reasonably very low-reward intention for the attacker provided the stage of work that would have been needed to establish this subtle malware.”

The sophisticated malware, dubbed Verblecon, is stated to have been very first noticed in January 2021, with the payload incorporating polymorphic characteristics to evade signature-primarily based detections by security computer software.

In addition, the loader carries out further more anti-assessment checks to figure out if it is at this time being debugged or opened in a digital or sandboxed setting, ahead of proceeding to copy alone into the machine and connecting to a remote server to retrieve an encrypted blob that incorporates a URL, which is then utilised to fetch miner payloads.

Prevent Data Breaches

“The action we have viewed carried out making use of this sophisticated loader indicates that it is being wielded by an individual who could not notice the capabilities of the malware they are making use of,” the scientists pointed out.

“Nevertheless, if it fell into the palms of a more subtle actor the opportunity is there for this loader to be utilized for more really serious attacks, including potentially ransomware and espionage strategies.”

Uncovered this short article exciting? Observe THN on Facebook, Twitter  and LinkedIn to go through more unique information we submit.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «experts detail virtual machine used by wslink malware loader for Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation
Next Post: Security Incidents Reported to FCA Surge 52% in 2021 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • ChatGPT Used to Develop New Malicious Tools
  • Dark Web Actors Fight For Drug Trafficking and Illegal Pharmacy Supremacy
  • Kinsing Cryptojacking Hits Kubernetes Clusters via Misconfigured PostgreSQL
  • New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks
  • UK insurer announces ‘world-first’ cyber catastrophe bond
  • Why Do User Permissions Matter for SaaS Security?
  • FCC plans strict overhaul of 15-year-old US data breach regulations
  • Security updates for Windows 7 finally end, users urged to upgrade
  • Global Cyber-Attack Volume Surges 38% in 2022
  • Millions of Vehicles at Risk: API Vulnerabilities Uncovered in 16 Major Car Brands

Copyright © TheCyberSecurity.News, All Rights Reserved.