GhostEngine Strikes: Sophisticated Malware Mines Crypto and Evades Detection

GhostEngine malware disables antivirus protections and hides its presence, allowing it to install cryptocurrency-mining software on infected machines. It uses sophisticated methods to ensure persistence and evade detection, including exploiting vulnerable drivers and creating scheduled tasks. Researchers have released YARA rules to help identify infections.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here