LemonDuck Crypto-Miner – a KingMiner Successor

Crypto-miners have been around for several years, in all forms and shapes, and distributed via various attack avenues. Increased competition from other cyber-criminal groups and various defenses set in place at the browser or security solution level ha… Continue reading LemonDuck Crypto-Miner – a KingMiner Successor

Vivin Nets Thousands of Dollars Using Cryptomining Malware

A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn’t going away anytime soon. Continue reading Vivin Nets Thousands of Dollars Using Cryptomining Malware

Panda Threat Group Mines for Monero With Updated Payload, Targets

Though harboring unsophisticated payloads, the Panda threat group has updated its tactics – from targets to infrastructure – and successfully mined hundreds of thousands of dollars using cryptomining malware. Continue reading Panda Threat Group Mines for Monero With Updated Payload, Targets

[SANS ISC] Crypto Mining Is More Popular Than Ever!

I published the following diary on isc.sans.edu: “Crypto Mining Is More Popular Than Ever!“: We already wrote some diaries about crypto miners and they remain more popular than ever. Based on my daily hunting statistics, we can see that malicious scripts performing crypto mining operations remain on top of the

[The post [SANS ISC] Crypto Mining Is More Popular Than Ever! has been first published on /dev/random]

Continue reading [SANS ISC] Crypto Mining Is More Popular Than Ever!

Google Play Store no longer accepts crypto-mining apps

Taking a leaf from Apple’s rulebook regarding cryptocurrency mining, Google has updated its Play Store guidelines to keep shady financial instruments out of its Android applications venue. Over on the Google Play Developer Policy Center, the tech… Continue reading Google Play Store no longer accepts crypto-mining apps

Another Cryptominer Delivered Through Altered JQuery.js File

A few days ago, I published a diary on the SANS Internet Storm Center website about a Javascript file that was altered to deliver a cryptominer into the victim’s browser. Since my first finding, I’m hunting for more samples. The best way to identify them is to search for the following

[The post Another Cryptominer Delivered Through Altered JQuery.js File has been first published on /dev/random]

Continue reading Another Cryptominer Delivered Through Altered JQuery.js File

New Virus Decides If Your Computer Good for Mining or Ransomware

Security researchers have discovered an interesting piece of malware that infects systems with either a cryptocurrency miner or ransomware, depending upon their configurations to decide which of the two schemes could be more profitable.

While ransomwa… Continue reading New Virus Decides If Your Computer Good for Mining or Ransomware

Multipurpose Trojan MysteryBot Targets Android Devices

Cybercriminals have a new Android malware program in their toolbox called MysteryBot that can serve multiple purposes: banking Trojan, keylogger and ransomware. The Trojan was identified by researchers from threat intelligence firm ThreatFabric and se… Continue reading Multipurpose Trojan MysteryBot Targets Android Devices