BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
BTC $68279.0927
ETH $3629.5433
BNB $418.8260
SOL $133.0943
XRP $0.6497
stETH $3620.7348
ADA $0.7707
DOGE $0.1827
AVAX $43.0376
DOT $9.8988
wstETH $4204.4051
TRX $0.1402
LINK $20.4333
WETH $3627.8562
MATIC $1.1461
WBTC $68015.7231
UNI $12.3628
BCH $469.5171
LTC $88.8112
IMX $3.1360
ICP $13.3800
CAKE $3.3523
ETC $35.9657
FIL $10.0244
LEO $4.8744
ATOM $12.4782
TON $2.7811
HBAR $0.1174
RNDR $7.3750
KAS $0.1614
INJ $40.6866
DAI $0.9990
OKB $56.8390
VET $0.0495
PEPE $0.0000
XLM $0.1458
FDUSD $0.9965
STX $3.0333
XMR $148.4317
WEMIX $2.7041
LDO $3.2821
NEAR $4.3354
GRT $0.3080
ARB $1.9787
THETA $2.3471
APEX $2.6824
BSV $115.5449
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • CHAOS in the ranks of Linux users


    A new Go malware called CHAOS is hitting Linux users in a crypto mining campaign.

    The CHAOS Trojan was discovered by Trend Micro in November 2022. A special feature of the malware is the destruction of other cryptominers and the deployment of its own, used to mine Monero.

    According to the researchers, CHAOS is fixed in the system by changing the file /etc/crontab (crontab is a special file that contains a schedule of tasks that the cron task scheduler will run), which is downloaded from Pastebin every 10 minutes.

    At this point, the payload is loaded, consisting of the XMRig miner and the CHAOS Go trojan. The main loader script and subsequent payloads are placed in multiple places, making the campaign much harder to stop.

    After downloading and launching, CHAOS transmits metadata about the victim's system to the attacker's server, and also provides hackers with the following functionality:

    Interaction with files;
    Creation of screenshots;
    Shutdown / restart the computer;
    Opening arbitrary URLs.

    Experts warn that hacks are getting more sophisticated and sophisticated, so campaigns and consumers alike need to stay vigilant about their cybersecurity.

    Author DeepWeb
    US residents face 30 years in prison for hacking corporate email
    Someone can monitor everything you enter

    Comments 0

    Add comment