Monday, 23 February 2026

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

iT4iNT SERVER Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts.
"Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim VDS VPS Cloud


http://dlvr.it/TR6vSD

No comments:

Post a Comment

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

iT4iNT SERVER Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) ...