New Cryptojacking Malware Campaign Evades Detection using Process Hollowing
Malware and Vulnerabilities | December 16, 2019
Researchers have spotted a new malware campaign that is mining for the Monero cryptocurrency. The campaign deploys Monero miner on Windows installations.To evade detection, this campaign was seen to be using the process hollowing technique. This process hollowing technique works by covering up a process with a secondary process. Specific arguments are required to trigger the malicious processes. Security experts from Trend Micro observed an increase in Monero mining malware recently. This particular campaign used process hollowing and a dropper component.