Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network
Malware and Vulnerabilities
February 21, 2022
Trend Micro
The malicious actor can have a coinminer masquerade itself as a legitimate app, trick susceptible users into running it on their systems, and just wait for the profits to roll in.
Read More
CoinMiner malware
Mac Malware
Mach-O binary
XMRig
I2P Network
Publisher
Previous
TitanHQ Announces Acquisition of Cyber Risk Aware
Companies to Watch
Next
The agency that may be able to thwart ransomware
Govt., Critical Infrastructure