cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Scam Information and Event Management

Hi All

 

An interesting approach:

 

While trying to deliver malware on victims’ devices and stay on them as long as they can, sometimes attackers are using quite unusual techniques. In a recent campaign starting in 2022, unknown malicious actors have been trying to mine cryptocurrency on victims’ devices without user consent; they’ve used large amounts of resources for distribution, but what’s more, used multiple unusual vectors for defense evasion and persistence. One of these vectors was abusing the open-source SIEM “Wazuh” agent.

We are quite sure that this campaign was a global one, but in this article, we’ll focus on an infection chain that, according to our telemetry, was targeting mainly Russian-speaking users. The attackers distributed the malicious files using websites for downloading popular software (uTorrent, Microsoft Office, Minecraft, etc.) for free. These websites were shown to users in the top search results in Yandex. Malware was also distributed through Telegram channels targeted at crypto investors and in descriptions and comments on YouTube videos about cryptocurrency, cheats and gambling.

 

https://securelist.com/miner-campaign-misuses-open-source-siem-agent/114022/

 

Regards

 

Caute_Cautim

1 Reply
loius0044
Viewer

Scam Information and Event Management (SIEM) is a crucial system for organizations to detect, analyze, and respond to fraudulent activities and cybersecurity threats. By collecting and correlating data from various sources such as network devices, servers, and user activities, SIEM helps identify suspicious patterns or anomalies glutathione cream price in pakistan that could indicate scams or breaches. The system enables real-time monitoring and automated alerts, allowing security teams to act swiftly to mitigate risks. SIEM also supports forensic analysis by logging detailed event data, helping organizations trace the source of scams and implement preventive measures to protect against future incidents.