K8’s Argo Workflows enable attackers to mine Monero (XMR), a privacy-focused cryptocurrency, on victims’ computers after performing a drive-by download. The tools, which were publicly announced by the security company last week, were used to mine Monero on a victim’s computer within a matter of minutes and without the victim’s knowledge. The tools, which were publicly announced by the security company last week, were used to mine Monero on a victim’s computer within a matter of minutes and without the victim’s knowledge.
On Wednesday, a new cryptocurrency exploit was discovered that made it possible to extract the Monero (XMR) cryptocurrency from a computer. In a matter of hours, the exploit was being used to mine Monero on a massive scale. To put this in perspective, the exploit could potentially be used to mine as much as $3.5 million a day.
In this post from ARK research, a team of researchers from Kaspersky Lab describe a set of new software tools used by a crypto mining operation called “Argo.” The researchers believe this mining operation is linked to a threat actor they have been tracking for some time now known as “Redco”.. Read more about monero and let us know what you think.
Because the crypto business is continuously updating and expanding its blockchain technology, they are often utilized for ethical hacking and assaults against the industry. Despite this, attackers are increasingly using Argo Workflows, the most commonly used engine for Kubernetes (K8), for illicit crypto mining.
Workflow-Based Argo Attacks
Technology advancements are also a boon for all types of illicit hacking and assaults on the crypto sector. In the hands of attackers, such technology has become lethal.
Despite this, attackers are increasingly using Kubernetes (K8), the most popular cloud computing platform. Furthermore, the attackers are now using K8’s Argo Workflows to link several crypto mining devices. Modules that are linked to the internet are also available.
Furthermore, by combining the Argo Workflows with K8, the attackers have allowed competent mining of cryptocurrencies such as Monero (XMR).
Furthermore, Intezer, a cybersecurity company, claims to have previously identified unsecured nodes. They also refer to these unsecured nodes as the entry points into the platform for attackers.
As a result, anybody will be able to target the susceptible platforms and force them to do whatever job they want.
Cloud Computing’s Consequences
K8-based assaults have lately become more common. Such assaults have been reported by a number of well-known IT companies. In the middle of this, Microsoft revealed last month on a K8 assault that used Kubeflow machine learning to target k8 clusters.
Furthermore, utilizing Ethminers, attackers have been able to mine cryptos such as Ethereum (ETH) unlawfully.
All of these assaults, however, are made feasible by the growing use of cloud computing, which provides the connection required for such hacks and attacks.
Furthermore, utilizing K8 machines, the majority of such Monero crypto miners may be readily hacked.
Because the bulk of Monero miners rely on such hardware protocols, several security companies anticipate even more large-scale assaults.
You’ve been recommended