<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>monero Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/monero/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Thu, 21 Jun 2018 20:43:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>New Monero Miner Earned $75,000 using 5-years-old Exploit</title>
		<link>https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/</link>
					<comments>https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 11:08:39 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[monero]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2312</guid>

					<description><![CDATA[<p>Cryptojacking is not something new in the recent years. Cryptocurrencies are immensely valuable to real cash, making them a good target for earning more money. Cryptocurrencies need to be mined. It’s a computational process of solving puzzles that require heavy hardware power. Recently, hackers were successful in running a Monero miner on several Linux servers [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/">New Monero Miner Earned $75,000 using 5-years-old Exploit</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptojacking is not something new in the recent years. Cryptocurrencies are immensely valuable to real cash, making them a good target for earning more money. Cryptocurrencies need to be mined. It’s a computational process of solving puzzles that require heavy hardware power. Recently, hackers were successful in running a Monero miner on several Linux servers using an old vulnerability.</p>
<p>This new campaign used the vulnerability in the Cacti plugin. For those who don’t know, Cacti is a PHP-based open-source tool for monitoring network, more specifically, in its “Network Weathermap” plugin. Using this plugin, servers visualize the network activity via a GUI.</p>
<p>Security experts from Trend Micro also found evidence that this attack is linked to the biggest cryptojacking in the history where hackers were able to earn around $3 million using a specialized Monero miner on Jenkins servers and by exploiting the CVE-2017-1000353 vulnerability. This time, the newer one used the CVE-2013-2618 vulnerability in the Cacti.</p>
<p>The flaw in Cacti allowed hackers to gain permission from the system to execute codes. Using the ability, they installed a modified version of XMRig – a legitimate software that’s used for mining Monero. In addition, they also included a bash script that worked as a watchdog for the mining process. If the miner program was down, it would restart it and if it was running, nothing to do. The checking process continued every 3 minutes.</p>
<p>This campaign earned the hackers 320 XMR ($75,000). All the infected servers were running Linux and major victims were situated in China, Taiwan, Japan and the USA.</p>
<h3>What to do now</h3>
<p>As long as the campaign is identified, it can be resolved very quickly. However, the hackers are already successful at their intentions. They earned a lot of cash, although less the largest one.</p>
<p>Such attacks demonstrate that our security measures are still not so tight after all. When it comes to updating the host system, system admins often forget or ignore them, as they may contain some complexity. That’s why hackers are able to keep on doing such hacking.</p>
<p>In order to stay protected, update all the software and the OS to the latest edition. It’s really important for fixing up all the known security holes. For every personal user, update all your programs to the latest version.</p>
<p>There are also other advanced cryptojacking campaigns, such as <a href="https://www.osradar.com/ghostminer-only-200/">GhostMiner – an awesome malware with fortune on our side</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/">New Monero Miner Earned $75,000 using 5-years-old Exploit</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cryptojacking from Android – Stay Secured</title>
		<link>https://www.osradar.com/cryptojacking-android-stay-secured/</link>
					<comments>https://www.osradar.com/cryptojacking-android-stay-secured/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 06:09:22 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[monero]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1834</guid>

					<description><![CDATA[<p>The market of cryptocurrency is seeing a huge fluctuation in the price. Take a look at Bitcoin, the price of every Bitcoin is a lot higher than the previous years. Bitcoin is currently seeing a downfall and experts say that the price of other cryptocurrencies is going to be higher. That is leading hackers to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-android-stay-secured/">Cryptojacking from Android – Stay Secured</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The market of cryptocurrency is seeing a huge fluctuation in the price. Take a look at Bitcoin, the price of every Bitcoin is a lot higher than the previous years. Bitcoin is currently seeing a downfall and experts say that the price of other cryptocurrencies is going to be higher. That is leading hackers to mine cryptocurrencies as much as possible. In this attempt, hackers have released infected Android apps that mine cryptocurrencies on your Android device, especially Monero.</p>
<p>Kaspersky researchers spotted several fake antivirus &amp; porn apps for Android that are malware infected. Those apps are used to mine Monero, launch DDoS attacks and also perform other malicious tasks. All of these actions caused the infected phones drain the battery a lot faster and eventually, bulge out of the cover.</p>
<p>Security researchers at Chinese IT security firm Qihoo 360 Netlab identified another malware. This wormable malware scans for wide-range of IP address for finding out any more vulnerable devices to infect them. The malware uses the infected devices to mine Monero. This one is named “ADB.Miner”.</p>
<p>The researchers told that “ADB.Miner” is the first of the kind of Android worm that uses the scanning code programmed in Mirai – the infamous IoT botnet malware. This malware caused major IoT companies offline last year by performing massive DDoS attacks against DynDNS.</p>
<h3>How the malware works</h3>
<p>ADB (Android Debug Bridge) is a command line toolkit for devs to debug Android code on the emulator and grants some of the most sensitive features of the operating system. Almost all the Android devices come up with ADB port disabled. So, how does the malware work?</p>
<p>“ADB.Miner” searches for Android devices – smartphones, smart TVs, TV set-top boxes – everything publicly accessible via the ADB debug interface. Those devices must be running over port 5555 to be infected. “ADB.Miner” installs a malware app that mines Monero cryptocurrency for its operator. That being said, the malware will only work on those devices that have been configured to enable port 5555 manually.</p>
<p>Additionally, the “ADB.Miner” tries to propagate itself into other devices from the newly infected devices.</p>
<p>Researchers aren’t completely sure how this malware is infecting Android devices. One thing for sure – this isn’t happening by exploiting any type of ADB flaw. The reason is, it’s infecting numerous devices from a wide variety of manufacturers.</p>
<p>The attack started on January 21, 2018, and has increased recently. Based on the IP addresses, the highest infected devices are from China (around 40%) and South Korea (around 31%), according to researcher’s estimation.</p>
<h3>How to stay protected</h3>
<p>In order to protect your Android device, be aware of using apps. Don’t install apps from any untrusted source. Be careful to install apps from Google Play Store at the same time. You can use a VPN or a firewall to block the port 5555. The best option is to get a good antivirus for your Android. Check out the <a href="https://www.av-test.org/en/antivirus/mobile-devices/android/">top Android antivirus from AV-Test</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-android-stay-secured/">Cryptojacking from Android – Stay Secured</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/cryptojacking-android-stay-secured/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
