Feb. 23, 2023, 8:16 a.m. | Mitch Datka - Ron Bolger

Cybersecurity Blog | CrowdStrike provinggrounds.cs.sys

CrowdStrike analyzed an I2Pminer variant that targets macOS The mineware utilizes I2P to hide XMRig network traffic The CrowdStrike Falcon® platform provides continuous protection against mineware threats by offering real-time visibility across workloads CrowdStrike recently analyzed a macOS-targeted mineware campaign that utilized malicious application bundles to deliver open source XMRig cryptomining software and Invisible Internet […]

application campaign continuous crowdstrike crowdstrike falcon cryptomining endpoint & cloud security falcon featured hide internet macos malicious malicious application network network traffic open source platform protection software threats traffic visibility workloads xmrig

More from provinggrounds.cs.sys / Cybersecurity Blog | CrowdStrike

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote