Estimated reading time: 0 minutes, 33 seconds

Hackers Use 'Process Hallowing' to Trick Detection Software and Steal Crypto

Researchers found evidence that hackers are using a “process hollowing technique” as a means to disguise cryptocurrency mining malware. So reports ZDNet.

Trend Micro researchers Arianne Dela Cruz, Jay Nebre, and Augusto Remillano identified attackers using the technique in Kuwait, India, Thailand, Brazil, Bangladesh, the United Arab Emirates and Pakistan. “A file landing on a target system acts as both a malware dropper and container, but is not, in itself, malicious. Known as process hollowing, the file contains the main executable and cryptocurrency mining software, rendering them inactive, in order to bypass protective checks” before being triggered by certain command line arguments, according to the article.

Read the full article from ZDNet.

Read 2486 times
Rate this item
(0 votes)

Visit other PMG Sites:

PMG360 is committed to protecting the privacy of the personal data we collect from our subscribers/agents/customers/exhibitors and sponsors. On May 25th, the European's GDPR policy will be enforced. Nothing is changing about your current settings or how your information is processed, however, we have made a few changes. We have updated our Privacy Policy and Cookie Policy to make it easier for you to understand what information we collect, how and why we collect it.