Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CrowdStrike Warns of Phishing Scams Targeting Job Seekers with XMRig Cryptominer
Global Security

CrowdStrike Warns of Phishing Scams Targeting Job Seekers with XMRig Cryptominer

AdminBy AdminJanuary 10, 2025No Comments3 Mins Read
Scam Targeting Job Seekers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 10, 2025Ravi LakshmananCrypto mining / malware

A scam targeting job seekers

Cybersecurity firm CrowdStrike is warning of a phishing campaign using its own brand to distribute a cryptocurrency miner disguised as an employee CRM application as part of an alleged recruitment process.

“The attack begins with a phishing email that mimics CrowdStrike recruitment, directing recipients to a malicious website,” the company said in a statement. said. “Victims are encouraged to download and run a fake application that serves as a bootloader for the XMRig cryptominer.”

The Texas-based company said it discovered the malicious campaign on January 7, 2025, and that it was “aware of the CrowdStrike fake employment scam.”

Cyber ​​security

Phishing emails lure recipients by claiming that they have been shortlisted for the next stage of the recruitment process for a junior developer role and that they need to join the conversation with the recruitment team by downloading a customer relationship management (CRM) tool provided in the embedded link

The downloaded binary, once launched, performs a series of checks to avoid detection and analysis before receiving the next stage’s payloads.

These checks include detecting the presence of a debugger and scanning the list of running processes for malware or virtualization software analysis. They also ensure that the system has a certain number of active processes and that the processor has at least two cores.

If the host satisfies all the criteria, the user is presented with an installation failed error message while secretly downloading the XMRig miner from GitHub and its corresponding configuration from another server (“93.115.172(.)41”) in the background. .

“The malware then runs the XMRig miner using command-line arguments in the downloaded configuration text file,” CrowdStrike said, adding that the executable installs security on the machine by adding a Windows batch script to the Start menu’s startup folder, which is responsible for launching Miner.

Fake LDAPNightmare PoC Targets Security Researchers

Fake LDAPNightmare PoC

The development comes as Trend Micro revealed that a fake proof-of-concept (PoC) for a recently discovered security flaw in Microsoft’s Windows Lightweight Directory Access Protocol (LDAP) – CVE-2024-49113 (aka LDAPN’s nightmare) – is used to lure security researchers into downloading information-stealing software.”

The malicious GitHub repository in question – github(.)com/YoonJae-rep/CVE-2024-49113 (now resolved) – is considered a fork the original repository from SafeBreach Labs, which hosts a legitimate PoC.

Cyber ​​security

However, the fake repository replaces the files associated with the exploit with a binary file called “poc.exe” that, when run, drops a PowerShell script to create a scheduled task to execute the Base64-encoded script. The decoded script is then used to load another script from Pastebin.

The latest stage malware is a steal that collects a machine’s public IP address, system metadata, process list, directory listings, network IP addresses, network adapters, and installed updates.

“Although the tactics of using PoC decoys as a means to deliver malware is not new, this attack remains a serious concern, especially because it exploits a trending issue that could potentially affect a larger number of victims,” ​​said security researcher Sarah Pearl Kamling.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.