Get a Pentest and security assessment of your IT network.

News

Hidden Bee miner delivered via improved drive-by download toolkit

A drive-by download attack trying to exploit CVE-2018-4878, a vulnerability in Flash Player. The payload served in this campaign is not a standard PE file. Instead, it is a multiple-stage custom executable format acting as a downloader to retrieve LUA scripts used by the threat actors behind the Hidden Bee miner botnet. This was perhaps the first case of a bootkit being used to enslave machines mining cryptocurrencies. The attackers are leveraging malvertising via adult sites to redirect their victims to the exploit kit landing page.”]

Source: https://blog.malwarebytes.com/threat-analysis/2018/07/hidden-bee-miner-delivered-via-improved-drive-by-download-toolkit/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones