Exploit kits: Winter 2018 review

In this Winter 2018 review, we check the pulse of exploit kits and their latest developments.
Categories:

Exploits
Threat analysis

Tags: CVE-2014-6332CVE-2015-2419CVE-2015-7645CVE-2015-8651CVE-2016-0189CVE-2018-4878EKsexploit kitsgrandsoftGreen… Continue reading Exploit kits: Winter 2018 review

Malicious cryptomining and the blacklist conundrum

When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult.
Categories:

Cryptomining
Threat analysis

Tags: adblockersblacklistcoinhivecryptominerscryptominingGitHub

(… Continue reading Malicious cryptomining and the blacklist conundrum

New RIG malvertising campaign uses cryptocurrency theme as decoy

This malvertising campaign uses a popular cryptocurrency theme to redirect users to the RIG exploit kit.
Categories:

Exploits
Threat analysis

Tags: cryptocurrenciesmalvertisingRIGRIGEK

(Read more…)

The post New RIG malvertising campa… Continue reading New RIG malvertising campaign uses cryptocurrency theme as decoy

The state of malicious cryptomining

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.
Categories:

Cybercrime

Tags: coin minerscoin-haveCoinbasecoi… Continue reading The state of malicious cryptomining

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:

Threat analysis

Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Categories:

Threat analysis

Tags: Chinesecoinhivedrive-byEKexploit kitexploitsFlash PlayerInternet Explorersvchost.exe… Continue reading Drive-by download campaign targets Chinese websites, experiments with exploits

Drive-by cryptomining campaign targets millions of Android users

Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.
Categories:

Threat analysis

Tags: AndroidBotCAPTCHAcoinhivecrypto miningcryptominingdrive-by

(Read more…)

The post… Continue reading Drive-by cryptomining campaign targets millions of Android users

Tech support scammers find new way to jam Google Chrome

Browsers are usually the first point of contact between victims and threat actors. With a few bits of code, crooks manage once again to freeze Google Chrome and scare users into calling for assistance.
Categories:

Malwarebytes news

Tags: chrome… Continue reading Tech support scammers find new way to jam Google Chrome

Tech support scammers find new way to jam Google Chrome

Browsers are usually the first point of contact between victims and threat actors. With a few bits of code, crooks manage once again to freeze Google Chrome and scare users into calling for assistance.
Categories:

Malwarebytes news

Tags: chrome… Continue reading Tech support scammers find new way to jam Google Chrome

Tech support scammers find new way to jam Google Chrome

Browsers are usually the first point of contact between victims and threat actors. With a few bits of code, crooks manage once again to freeze Google Chrome and scare users into calling for assistance.
Categories:

Malwarebytes news

Tags: chrome… Continue reading Tech support scammers find new way to jam Google Chrome