Recently, the Alibaba Cloud Security Team found that the 8220 Mining Group began to use rootkit to hide its mining programs. By using this method, mining programs can reside on compromised hosts longer without being detected. Developed after the application of watchdogs and other mining worms, this concealment technology has been widely applied and is evolving. It is predicted that methods to hide mining worms on hosts and the corresponding defenses will become a major security issue in the future.



Read more and join Faun to receive similar hand-curated and must-read articles and news.


Related Posts


Joseph Holbrook , 4 weeks, 1 day ago

How to Install Facebook Libra Testnet on Google Cloud Platform(GCP)

Deploying Facebook Libra testnet on Google Cloud Platform is a simple process that will take about a..