Stealthy Crypto-Mining Malware Evades Detection

0

Dropped by other malware or downloaded from the internet, the coinminer infects the user system after arriving as a Windows Installer MSI file. It then drops multiple files in the directory as part of its process and uses the CryptoNight algorithm for its coin-mining routing.

Read full news article on Infosecurity