CVE-2025-21087 – F5 BIG-IP TMM Vulnerability
February 7, 2025Rhadamanthys Stealer – Active IOCs
February 7, 2025CVE-2025-21087 – F5 BIG-IP TMM Vulnerability
February 7, 2025Rhadamanthys Stealer – Active IOCs
February 7, 2025Severity
High
Analysis Summary
CoinMiner is a malware designed to secretly mine cryptocurrencies, such as Bitcoin, on infected computers. The malware is typically spread through email attachments, malicious websites, or software downloads, and can infect both personal and business computers.
Once installed, CoinMiner malware will use the computer's processing power to solve complex mathematical algorithms and earn cryptocurrency for the hackers who created the malware. This can slow down the infected computer and cause it to overheat, potentially causing damage to the hardware.
CoinMiner malware is often difficult to detect because it is designed to run quietly in the background without drawing attention to itself. However, there are some signs that your computer may be infected with CoinMiner malware, including:
- Sluggish performance
- Increased CPU usage
- Overheating
- Fans running at a high speed
- Increased electricity bills
To prevent CoinMiner malware and other types of malware from infecting your computer, it's important to keep your operating system and antivirus software up to date, avoid downloading software or opening email attachments from unknown sources, and be cautious when visiting unfamiliar websites.
Impact
- Financial Loss
- Hardware Damage
- Data Loss
Indicators of Compromise
MD5
e71ab41ec966e2257fd5d99baf1f5221
1af84d779e922e95e36c6faf697c09ba
1899b6a608022a8f9ddf14bd9bd287f0
f4c866db2017f260574cfe9e8d94a0ac
0d992da3b3e3af427d9024f386ef414d
SHA-256
48d5c783f511156eaebfd6aa22be6b8552990880228e8ab959e5ad32c0c07a8e
79e83bf4a6260efd999ce5b30f8bc46b6d4aa91a08fab81decd34a8b4663a1f2
43bd2700c307495b14ff7f97ec76c48dc91b9e089a652eeb4e3aa04318413827
f053fd37989a77795022184b5a91e0d653911d2d3790706b953bcebbac3ff720
767332127c506b0479027a78625ae7f4a7dca777dc34b916c67a927084da2eb5
SHA1
c12713f3d97457c91768050488436496c9361e22
ddeab2b6688344be1b58f24372bccf64fcea1075
ef5cc155aa40283558ee56017d90d2e5dfe3b5bb
713f0c8472a0ee554a331a1574220b2624c7a3e0
cc85e987243d6408e6ec3dbf2d13a05733983bed
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- In addition, users can also consider using ad-blockers and disabling JavaScript in their web browsers to reduce the risk of drive-by downloads of CoinMiner malware.