A previously undocumented botnet called “VictoryGate” propagated via infected USB devices in order to perform Monero-mining functionality. Slovakian security firm ESET revealed that it had sinkholed several command-and-control (C&C) domains so that it could monitor VictoryGate’s activity. Through this process, the company learned that VictoryGate had been active since at least May 2019 and that […]… Read More
The post VictoryGate Monero-Mining Botnet Spread via Infected USB Devices appeared first on The State of Security.
from The State of Security https://ift.tt/2YarXuX
via https://ifttt.com/ IFTTT
No comments:
Post a Comment