New KingMiner Threat Shows Cryptominer Evolution
#1
Quote:The researchers at CheckPoint analyzed the new threat and gave it the name KingMiner. They found that it targets Microsoft IIS and SQL Servers in particular and runs a brute-force attack to gain access. Once in, the malware determines the CPU architecture and checks for older versions of itself to remove them.

It relies on the freely available XMRig miner to create Monero coins, with a configuration file that contains private mining pool with the API disabled to keep away from prying eyes.

According to the researchers, the miner is configured to use 75% of the CPU resources but in practice, it uses 100% of the processor, probably because of bugs in the code.

KingMiner implements several defenses against emulation environments and detection, recording low rates with some antivirus engines by using an XML payload disguised as a ZIP file.

"The use of evasion techniques is a major component of a successful attack," CheckPoint says, adding that the malware uses simple techniques to bypass emulation and detection methods.

Source: https://www.bleepingcomputer.com/news/se...evolution/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 15:21
Free Download Manager 6.30.0.6459
Changes in 6.30.0....harlan4096 — 13:51
AMD introduces Ryzen PRO 9000 series, Ry...
AMD launches first...harlan4096 — 13:49
Ashampoo Home Design 10 FREE!
Jaki jest kodCygi — 09:31
AMD launches EPYC 4005 Embedded, Zen5 CP...
AMD has new EPYC 4...harlan4096 — 08:54

[-]
Birthdays
Today's Birthdays
avatar (45)ThomasLYDAY
avatar (40)upakoExapy
Upcoming Birthdays
avatar (38)fapedDow
avatar (48)pohudidere
avatar (38)eqiduseb
avatar (49)skepwHug
avatar (38)RicardoGoase
avatar (43)Denpokhew
avatar (35)azidony
avatar (40)maskbSleew

[-]
Online Staff
There are no staff members currently online.

>