50% of November is gone.
You still haven’t doubled your setup?

BOGO: AI Edge & Bandwidth Miners

🎟️ Code: BLACKFRYDAY25
🛒 https://t.co/Kpiy3tZMdO

#DePIN #CryptoMiners #AI #BlackFriday

: Fry Networks | Decentralized IoT Infrastructure Powered by Fry

Build a future-ready decentralized network infrastructure with Fry Networks. Our eco-conscious IoT devices power secure, open, and scalable networks across key industries.

Fry Networks
A bizarre new Linux malware can be found hiding in cute animal photos - That cute panda pic? It's actually a cryptominer https://www.techradar.com/pro/security/a-damaging-new-linux-malware-is-hiding-in-cute-animal-photos
That cute panda pic? It's actually a cryptominer #cybersecurity #Linux #malware #cuteimages #Pandas #cryptominers #LLMCoded
📢 Analyse du malware Blitz : un danger pour les joueurs
📝 L'article publié par le Threat Research Center de Palo Alto Networks le 6 juin 2025, offre une **analyse approfondie** du malware Blitz, découvert en 2024 et toujours en développement actif en 2...
📖 cyberveille : https://cyberveille.ch/posts/2025-06-09-analyse-du-malware-blitz-un-danger-pour-les-joueurs/
🌐 source : https://unit42.paloaltonetworks.com/blitz-malware-2025/
#commande_et_contrôle #cryptominers #Cyberveille
Malicious #VSCode extensions infect Windows with #cryptominers
The package names are:
Discord Rich Presence for VS Code - 189K Installs
Rojo – Roblox Studio Sync - 117K Installs
Solidity Compiler - 1.3K Installs
Claude AI
Golang Compiler
ChatGPT Agent for VSCode
HTML Obfuscator
Python Obfuscator for VSCode
Rust Compiler for VSCode
ExtensionTotal says it reported the malicious extensions to #Microsoft, but they are still available at the time of writing.
https://www.bleepingcomputer.com/news/security/malicious-vscode-extensions-infect-windows-with-cryptominers/
Malicious VSCode extensions infect Windows with cryptominers

Nine VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer to mine Ethereum and Monero.

BleepingComputer
Malicious VSCode extensions infect Windows with cryptominers

Nine VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer to mine Ethereum and Monero.

BleepingComputer
Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks.

GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Cybercriminals are impersonating CrowdStrike recruiters to distribute #cryptominers. They send emails inviting victims to schedule interviews, but the links lead to malicious websites that download #malware disguised as a "CRM application”☝️🤖

https://www.darkreading.com/threat-intelligence/crowdstrike-job-interviews-hacker-tactic

Fake CrowdStrike Job Interviews Become Latest Hacker Tactic

Cybercriminals are luring victims into downloading the XMRig cryptomining malware via convincing emails, inviting them to schedule fake interviews using a malicious link.

Arkansas officials halt cryptomine near LR Airbase due to national security concerns

A new cryptomine that will be built near Little Rock Air Force Base is alarming an Arkansas lawmaker and Lonoke County and Cabot city officials, who are concern

KATV
#Windows infected with backdoored #Linux #VM in #new phishing attacks
Using #virtualmachines to conduct attacks is nothing new, with #ransomware gangs and #cryptominers using them to stealthily perform malicious activity. However, threat actors commonly install these manually after they breach a network.
https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/ #QEMU #ITSec
Windows infected with backdoored Linux VMs in new phishing attacks

A new phishing campaign dubbed 'CRON#TRAP' infects Windows with a Linux virtual machine that contains a built-in backdoor to give stealthy access to corporate networks.

BleepingComputer

Happy Friday everyone!

#Cryptominers and #CVE20173506 is featured in today's #readoftheday! Trend Micro takes us through a riveting tale where the protagonist, #WaterSigbin, abuses a vulnerability in Oracle WebLogic Servers. After exploitation, a Base64-encoded payload is run that drops the initial stage loader named "wireguard2-3.exe", which masquerades itself as a legitimate VPN technology to help with it's defense evasion. It also plays a role in getting the attack to the next stages which involve DLL-reflection, C2 communication, and finally the #XMRig cyrptominer.

Significant details that are included is a scheduled task created for Windows Defender exclusion, some discovery using WMI, and another scheduled task for persistence. As usual, I am not going to spoil it all, go and have a read for yourself! Enjoy and Happy Hunting!

Notable MITRE ATT&CK TTPs (thanks to the authors):
TA0001 - Initial Access
T1190 - Exploit Public-Facing Application

TA0002 - Execution
T1059.001 - Command and Scripting Interpreter: PowerShell
T1047 - Windows Management Instumentation

TA0005 - Defense Evasion
T1620 - Reflective Code Loading
T1036.005 - Masquerading: Match Legitimate Name or Location
T1562.001 - Impair Defenses: Disable or Modify Tools

TA0003 - Persistence
T1053.005 - Scheduled Task/Job: Scheduled Task

TA0011 - Command And Control
T1571 - Non-Standard Port
T1071 - Application Layer Protocol

TA0007 - Discovery
T1057 - Process Discovery
T1012 - Query Registry

Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer
https://www.trendmicro.com/en_us/research/24/f/water-sigbin-xmrig.html

Intel 471 #CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #gethunting

Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer

We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner.

Trend Micro