RIG Exploit Kit Starts Using IE Zero-Day Flaw Patched in May

The latest version of the RIG exploit kit, a tool used by cybercriminals to launch large-scale drive-by download attacks, is exploiting an Internet Explorer vulnerability that was patched by Microsoft last month after being found in targeted cyberespi… Continue reading RIG Exploit Kit Starts Using IE Zero-Day Flaw Patched in May

Cryptocurrency Miners Are Sabotaging Blockchains for Their Personal Gain

A wave of 51 percent attacks affecting Bitcoin Gold, Verge, and Monacoin resulted in nearly $20 million worth of cryptocurrency being stolen from exchanges this week. Continue reading Cryptocurrency Miners Are Sabotaging Blockchains for Their Personal Gain

Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong?

Shortly after Microsoft announced support for custom JavaScript functions in Excel, someone demonstrated what could possibly go wrong if this feature is abused for malicious purposes.

As promised last year at Microsoft’s Ignite 2017 conference, the co… Continue reading Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong?

Higher Education a Top Target for Cryptomining

You know an internet-based technology is becoming more accepted into the mainstream when cybercriminals make it a target for attacks. We saw it with malware designed specifically for Apple products, and later with smartphone and tablet apps. Last year… Continue reading Higher Education a Top Target for Cryptomining

Higher Education a Top Target for Cryptomining

You know an internet-based technology is becoming more accepted into the mainstream when cybercriminals make it a target for attacks. We saw it with malware designed specifically for Apple products, and later with smartphone and tablet apps. Last year… Continue reading Higher Education a Top Target for Cryptomining

Hackers Exploit Drupal Vulnerability to Install Cryptocurrency Miners

A highly critical vulnerability patched in the popular Drupal content management system two weeks ago is seeing a wave of exploits, some of which install cryptocurrency mining malware on servers. The vulnerability tracked as CVE-2018-7600 but also dub… Continue reading Hackers Exploit Drupal Vulnerability to Install Cryptocurrency Miners

Hunting down Dofoil with Windows Defender ATP

Dofoil is a sophisticated threat that attempted to install coin miner malware on hundreds of thousands of computers in March, 2018. In previous blog posts we detailed how behavior monitoring and machine learning in Windows Defender AV protected custome… Continue reading Hunting down Dofoil with Windows Defender ATP

Google Bans Cryptocurrency Mining Extensions From Chrome Web Store

In an effort to prevent cryptojacking by extensions that maliciously mine digital currencies without users’ awareness, Google has implemented a new Web Store policy that bans any Chrome extension submitted to the Web Store that mines cryptocurrency.

O… Continue reading Google Bans Cryptocurrency Mining Extensions From Chrome Web Store