Are attackers harnessing your Redis server?

Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many Internet-facing Redis servers and that 75% of them show signs of having been inf… Continue reading Are attackers harnessing your Redis server?

Cryptomining apps are on the rise, malicious apps in app stores decline

RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the cryptocurrency landscape is paying off for threat actors via the mobile attack ve… Continue reading Cryptomining apps are on the rise, malicious apps in app stores decline

How security pros see the future of cryptocurrencies and cryptomining

Data gathered by Lastline at RSA Conference 2018 reveals security professionals’ perspectives on the future of cryptocurrencies and cryptomining, response to ransomware attacks, and security impact of IoT devices. “Security teams are fighting a multi-f… Continue reading How security pros see the future of cryptocurrencies and cryptomining

Dig this: The future of crypto-mining botnets

The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of applications. And as always, cybercriminals are among the earliest adopters, and u… Continue reading Dig this: The future of crypto-mining botnets

MyEtherWallet users robbed after successful DNS hijacking attack

Unknown attackers have managed to steal approximately $150,000 in Ethereum from a number of MyEtherWallet (MEW) users, after having successfully redirected them to a phishing site posing as MyEtherWallet.com. The redirection was seamless, and the only … Continue reading MyEtherWallet users robbed after successful DNS hijacking attack

Exfiltrating private keys from air-gapped cold wallets

Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security researchers from the Ben-Gurion University of the Negev, Israel, extracting private key… Continue reading Exfiltrating private keys from air-gapped cold wallets

2.5 billion crypto mining attempts detected in enterprise networks

The volume of cryptomining transactions has been steadily growing since Coinhive came out with its browser-based cryptomining service in September 2017. Some websites have embraced the option and are giving their visitors the choice between viewing ads… Continue reading 2.5 billion crypto mining attempts detected in enterprise networks

Google to purge cryptomining extensions from Chrome Web Store

In a bid to prevent Chrome users’ computers being covertly used for cryptocurrency mining, Google will try to purge the Chrome Web Store of extensions that hijack machines’ CPU resources to do just that. Announced changes “Until now, … Continue reading Google to purge cryptomining extensions from Chrome Web Store

Using biometrics to protect crypto currency

The rise of crypto currency is something that investors have monitored closely. Whether Bitcoin, Zcash or Ripple, the rise of this digital currency is here to stay. With this boom of crypto currencies and blockchains for asset holdings, currency exchan… Continue reading Using biometrics to protect crypto currency

Crypto mining runs rampant in higher education: Is it students?

The higher education sector exhibited a startling increase in potentially damaging cryptocurrency mining behaviors, according to Vectra. The Attacker Behavior Industry Report reveals cyberattack detections and trends from a sample of 246 opt-in enterpr… Continue reading Crypto mining runs rampant in higher education: Is it students?