Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
A recent cybersecurity report has uncovered a new cryptojacking scheme that utilizes pirated software bundles to distribute a customized XMRig miner program on compromised devices. According to Trellix researcher Aswath A, the malware employs a complex, multi-stage infection strategy aimed …
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb Read More »










