New Blog Post | When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat

Microsoft

lemon-duck-geographic-distribution.png

When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructu...

Combating and preventing today’s threats to enterprises require comprehensive protection focused on addressing the full scope and impact of attacks. Anything that can gain access to machines—even so-called commodity malware—can bring in more dangerous threats. We’ve seen this in banking Trojans serving as entry point for ransomware and hands-on-keyboard attacks. LemonDuck, an actively updated and robust malware that’s primarily known for its botnet and cryptocurrency mining objectives, followed the same trajectory when it adopted more sophisticated behavior and escalated its operations. Today, beyond using resources for its traditional bot and mining activities, LemonDuck steals credentials, removes security controls, spreads via emails, moves laterally, and ultimately drops more tools for human-operated activity.

0 Replies
www.000webhost.com