Get a Pentest and security assessment of your IT network.

News

Cryptominers and fileless PowerShell techniques make for a dangerous combo

Cryptomining malware is one of the most common threats to enterprise systems. The sophistication of cryptominers has grown over the years, incorporating attack vectors and techniques such as fileless execution, run-time compilation and reflective code injection. The malware arrived as an encoded script that, when executed, set up a scheduled task to run at system setup and launch a second encoded PowerShell command. Once loaded, the cryptominer initiates communications with a series of Tor nodes, which likely serve as anonymizing proxies in order to hide the real location of mining pools.”]

Source: https://www.csoonline.com/article/3487711/cryptominers-and-fileless-powershell-techniques-make-for-a-dangerous-combo.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin