New Cryptojacking Malware Campaign Evades Detection using Process Hollowing

Researchers have spotted a new malware campaign that is mining for the Monero cryptocurrency. The campaign deploys Monero miner on Windows installations.To evade detection, this campaign was seen to be using the process hollowing technique. This process hollowing technique works by covering up a process with a secondary process. Specific arguments are required to trigger the malicious processes. Security experts from Trend Micro observed an increase in Monero mining malware recently. This particular campaign used process hollowing and a dropper component.

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More