Pink Drainer group targets hundreds of victims with crypto-mining malware
A group of hackers known as Pink Drainer is targeting vulnerable servers worldwide, installing crypto-mining malware and stealing sensitive information. According to a report by security researchers at Palo Alto Networks, the group has already compromised hundreds of victims.
- The Pink Drainer group targets vulnerable servers running open-source software and exploits known vulnerabilities to install crypto-mining malware. They then use the victims’ computing power to mine cryptocurrency, generating revenue for themselves.
- The group has been active since at least June 2018 and has targeted victims across North America, South America, Europe, and Asia. Their targets include government agencies, educational institutions, and cryptocurrency exchanges.
- In addition to crypto-mining, the group also steals sensitive information such as login credentials, which they sell on the dark web to other criminals.
- The Pink Drainer group uses sophisticated techniques to avoid detection, including encrypting their code and avoiding patterns that might be flagged by anti-virus software.
- Victims can protect themselves by keeping their software up-to-date, using strong passwords, and monitoring their networks for unusual activity. Anti-virus software can also help detect and remove malware.
The Pink Drainer group is a sophisticated hacking group targeting vulnerable servers worldwide. They install crypto-mining malware and steal sensitive information, generating revenue for themselves and other criminals. Victims can protect themselves by keeping their software up-to-date, using strong passwords, and monitoring their networks for unusual activity.Original Article: https://www.infosecurity-magazine.com/news/hackers-impersonate-hacks-to-steal/