Get a Pentest and security assessment of your IT network.

Cyber Security

Norman Cryptominer Employs Sophisticated Obfuscation Tactics

A never-before-seen cryptomining variant, dubbed Norman after one of its executable files, has been spotted in the wild using various techniques to hide and avoid discovery. The malware s deployment can be divided into three stages: Execution, injection and mining each with its own evasion methods. Researchers uncovered an initial sample after investigating an ongoing malware infection that had spread to nearly every server and workstation at a midsize company. Norman too at first seemed to be a generic miner hiding itself as svchost.exe, the researchers said.

Source: https://threatpost.com/norman-cryptomining-sophisticated-obfuscation/147310/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security