Persistence in the Shadows: A Study of Zephyr Miner Exploiting System Services

Credit to Author: Rayapati Lakshmi Prasanna Sai| Date: Mon, 02 Dec 2024 15:15:15 +0000

Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex…

The post Persistence in the Shadows: A Study of Zephyr Miner Exploiting System Services appeared first on Quick Heal Blog.

Read more

Horde of miner bots and backdoors leveraged Log4J to attack VMware Horizon servers

Credit to Author: Gabor Szappanos| Date: Tue, 29 Mar 2022 11:26:28 +0000

In the wake of December 2021 exposure of a remote code execution vulnerability (dubbed “Log4Shell”) in the ubiquitous Log4J Java logging library, we tracked widespread attempts to scan for and exploit the weakness—particularly among cryptocurrency mining bots. The vulnerability affected hundreds of software products, making it difficult for some organizations to assess their exposure. One […]

Read more