You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It's common for malware installed through a runtime compromise to delete itself from the filesystem once the malware process has started, to make detection of the malware difficult. Filesystem scans will not find the malware.
For example, a Wordpress honeypot container attracted a crypto miner which was installed in /var/www/html/wp-content/themes/twentytwentyone/xmra64, started as pid 8823, and then deleted:
It's common for malware installed through a runtime compromise to delete itself from the filesystem once the malware process has started, to make detection of the malware difficult. Filesystem scans will not find the malware.
For example, a Wordpress honeypot container attracted a crypto miner which was installed in
/var/www/html/wp-content/themes/twentytwentyone/xmra64
, started as pid 8823, and then deleted:YaRadare scans of the container filesystem did not detect anything untoward.
The running application binary was captured and scanned as follows:
YaRadare scans of these files identified the crypto miner:
The text was updated successfully, but these errors were encountered: