Tagged articles
11 articles
Page 1 of 1
Open Source Linux
Open Source Linux
Jun 1, 2022 · Information Security

How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do

This article chronicles the discovery of a server breach used for cryptocurrency mining, analyzes the malicious Python payload and its system modifications, and provides concrete remediation steps such as system reinstall, non‑root deployment, firewall hardening, and Nginx authentication.

Cryptocurrency MiningServer SecuritySpringBoot
0 likes · 12 min read
How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do
Open Source Linux
Open Source Linux
Nov 4, 2021 · Information Security

How to Detect and Remove Cryptocurrency Mining Trojans from Linux Servers

This guide explains what mining trojans are, how to identify their presence through CPU usage, suspicious processes, cron jobs and network activity, and provides step‑by‑step commands for isolating, blocking, and fully cleaning infected Linux hosts to prevent recurrence.

Cryptocurrency Miningcroniptables
0 likes · 12 min read
How to Detect and Remove Cryptocurrency Mining Trojans from Linux Servers
Liangxu Linux
Liangxu Linux
Feb 25, 2021 · Information Security

How to Automate Linux Incident Response and Analyze a Mining Malware

This article shares a step‑by‑step Linux incident‑response workflow, including an automated Bash information‑gathering script, analysis of malicious cron jobs and a 439‑line mining malware, its SSH‑based lateral spread, and practical cleanup procedures with a reusable toolbox on GitHub.

Bash AutomationCron JobsCryptocurrency Mining
0 likes · 13 min read
How to Automate Linux Incident Response and Analyze a Mining Malware
macrozheng
macrozheng
Feb 2, 2021 · Information Security

How Malware Hides Its Mining Process on Linux and How to Uncover It

An infected Linux server shows high CPU usage but standard tools miss the culprit; this guide explains how mining malware hides its process via /proc tricks, demonstrates detection using network scans, unhide tools, and offers removal steps to eradicate the hidden miner.

Cryptocurrency MiningLinuxinformation security
0 likes · 8 min read
How Malware Hides Its Mining Process on Linux and How to Uncover It
Efficient Ops
Efficient Ops
Jan 13, 2021 · Information Security

How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis

This article walks through a real‑world Linux mining malware infection, detailing how the attacker hid a malicious cron job, used LD_PRELOAD rootkits, propagated via SSH keys, and how the analyst uncovered and removed the threat using busybox, strace, and careful forensic commands.

Cryptocurrency Miningincident responsemalware analysis
0 likes · 12 min read
How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis
Liangxu Linux
Liangxu Linux
Aug 16, 2020 · Information Security

How Doki Malware Exploits Misconfigured Docker APIs to Mine Cryptocurrency

The Ngrok‑based Doki malware silently scans for Docker API endpoints with weak configurations, hijacks containers to run crypto miners, uses the Dogecoin blockchain for dynamic C2 domains, and evades detection, highlighting the critical need to secure Docker APIs.

Container SecurityCryptocurrency MiningDocker
0 likes · 6 min read
How Doki Malware Exploits Misconfigured Docker APIs to Mine Cryptocurrency
Efficient Ops
Efficient Ops
May 31, 2020 · Information Security

Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD

This article walks through a real‑world Linux mining malware incident, detailing how the attacker used a malicious crontab entry and LD_PRELOAD to hide processes, the forensic steps to uncover the payload, and practical remediation and hardening measures to prevent future compromises.

Cryptocurrency MiningLD_PRELOADLinux security
0 likes · 12 min read
Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD
ITPUB
ITPUB
Nov 26, 2018 · Information Security

Inside Linux.BtcMine.174: How Dr.Web’s New Malware Hijacks Linux Systems

Dr.Web’s recent report reveals Linux.BtcMine.174, a sophisticated 1000‑line shell‑script trojan that exploits Dirty COW or CVE‑2013‑2094 for root access, disables dozens of antivirus processes, mines cryptocurrency, and spreads via SSH‑collected hosts, with its components’ SHA‑1 hashes published on GitHub.

Cryptocurrency MiningLinuxinformation security
0 likes · 3 min read
Inside Linux.BtcMine.174: How Dr.Web’s New Malware Hijacks Linux Systems
Efficient Ops
Efficient Ops
Sep 6, 2018 · Information Security

Key Findings from China’s 2018 Q2 Internet Security Threat Report

The 2018 second‑quarter report by the Ministry of Industry and Information Technology details the monitoring of approximately 18.4 million internet security threats, highlighting compromised user email accounts, attacks on industrial IoT platforms and devices, the rise of illegal cryptocurrency mining, and outlines the major mitigation actions taken, including vulnerability remediation, network protection for major events, and coordinated emergency drills.

Cryptocurrency MiningIndustrial IoTemail hijacking
0 likes · 8 min read
Key Findings from China’s 2018 Q2 Internet Security Threat Report
ITPUB
ITPUB
Jul 22, 2016 · Information Security

How Mining Trojans Hijack Linux Servers: Sample 101 Analysis and Defense

The article examines a cryptocurrency mining trojan (sample 101), detailing its process list, malicious startup scripts, SSH key injection, service deployment, removal steps, and offers practical defense measures against such malware infections.

Cryptocurrency MiningLinuxSSH
0 likes · 7 min read
How Mining Trojans Hijack Linux Servers: Sample 101 Analysis and Defense