Asian cloud service providers have been targeted by a sophisticated malware campaign designed to steal computing power for mining cryptocurrency. The attack techniques deployed by the CoinStomp malware include timestomping (modification of a file’s timestamp), removal of system cryptographic policies, and use of a reverse shell to initiate command and control communications with the malicious software.
“Timestomping has been used by the Rocke group in prior cryptojacking attacks,” Matt Muir, a researcher for Cado Security, wrote at the company’s website. “However, it’s not a technique commonly seen in the wild. Generally, this technique is employed as an anti-forensics measure to confuse investigators and foil remediation efforts.”
More Stories
Apple Patches Three Actively Exploited Zero-Days
Bugs were found by Citizen Lab and Google Read More
How To Talk To Your Kids About Identity Theft
Let’s be honest, talking to your kids about identity theft isn’t probably top of your list. There’s a long list...
Snatch ransomware – what you need to know
The FBI and US Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint advisory warning organisations about a ransomware-as-a-service...
UK-US Confirm Agreement for Personal Data Transfers
The agreement, which represents an extension to the EU-US Data Privacy Framework, will enable the free flow of personal data...
Donald Trump Jr’s hacked Twitter account announces his father has died
Donald Trump Jr may not have just inherited his famous father's name. He may also have inherited his bad password...
Smashing Security podcast #340: Heated seats, car privacy, and Graham’s porn video
Do you know what data your car is collecting about you? Do you think it’s right for a car manufacturer...