From ddffa49b42e57ed189088208815ae3b3f73c899b Mon Sep 17 00:00:00 2001 From: Deborah Servili Date: Mon, 15 Jan 2018 15:45:26 +0100 Subject: [PATCH] add Digmine --- clusters/tool.json | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/clusters/tool.json b/clusters/tool.json index 386fb840..048e61b3 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -10,7 +10,7 @@ ], "description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.", "uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f", - "version": 48, + "version": 49, "values": [ { "meta": { @@ -3338,6 +3338,15 @@ "PYLOT" ] } + }, + { + "value": "Digmine", + "description": "Digmine is coded in AutoIt, and sent to would-be victims posing as a video file but is actually an AutoIt executable script. If the user’s Facebook account is set to log in automatically, Digmine will manipulate Facebook Messenger in order to send a link to the file to the account’s friends. The abuse of Facebook is limited to propagation for now, but it wouldn’t be implausible for attackers to hijack the Facebook account itself down the line. This functionality’s code is pushed from the command-and-control (C&C) server, which means it can be updated.", + "meta": { + "refs": [ + "https://blog.trendmicro.com/trendlabs-security-intelligence/digmine-cryptocurrency-miner-spreading-via-facebook-messenger/" + ] + } } ] }