Rise in cryptomining malware impacts organizations worldwide

Cybercriminals are increasingly turning to cryptominers to develop illegal revenue streams, while ransomware and malvertising adware continue to impact organizations worldwide, according to Check Point. During the period July to December 2017, one in f… Continue reading Rise in cryptomining malware impacts organizations worldwide

ICO protection: Key threats, attack tools and safeguards

Group-IB has analyzed the basic information security risks for the cryptoindustry and compiled a rating of key threats to an ICO (initial coin offering). On average, over 100 attacks are conducted on one ICO, and criminals are increasingly using modifi… Continue reading ICO protection: Key threats, attack tools and safeguards

Fake cryptocurrency wallet carries ransomware, leads to spyware

People around the world are rushing to acquire all kinds of cryptocurrency, hoping that prices will go up and they will be rolling in money when they sell their investment stash. Criminals have, expectedly, noticed the rush and are doing their level be… Continue reading Fake cryptocurrency wallet carries ransomware, leads to spyware

Satori variant hacks into mining rigs, steals ETH by replacing wallet address

Qihoo 360 Netlab researchers warn about a new variant of the Satori malware that apparently goes after ether (ETH) mining rigs. The malware The malware, dubbed Satori.Coin.Robber, started to reestablish the Satori botnet sinkholed last December, but al… Continue reading Satori variant hacks into mining rigs, steals ETH by replacing wallet address

RIG EK covertly delivers cryptocurrency miners

Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. They trick victims into installing mining software, hijack their CPU’s po… Continue reading RIG EK covertly delivers cryptocurrency miners

Hardware wallet security is no match for scammers’ ingenuity

It is often noted that hardware cryptocurrency wallets are one of the better options for keeping one’s private keys safe: they are not affected by malware, the private keys are usually stored and used in a protected area of a microcontroller (and… Continue reading Hardware wallet security is no match for scammers’ ingenuity

PyCryptoMiner ropes Linux machines into Monero-mining botnet

A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a crypto-miner written in the Python scripting language, a fact that serves to kee… Continue reading PyCryptoMiner ropes Linux machines into Monero-mining botnet

How to keep your browser and devices safe from cryptojackers

Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts have found their way to a variety of websites – streaming, gaming, onli… Continue reading How to keep your browser and devices safe from cryptojackers

Google Play Boots 3 Fake Bitcoin Wallet Apps

Google moved quickly to kick three fake bitcoin wallet apps from its Google Play marketplace after researchers discovered them earlier this month. Continue reading Google Play Boots 3 Fake Bitcoin Wallet Apps