Someone is roping Apache NiFi servers into a cryptomining botnet

If you’re running an Apache NiFi instance exposed on the internet and you have not secured access to it, the underlying host may already be covertly cryptomining on someone else’s behalf. The attack Indicators of the ongoing campaign were f… Continue reading Someone is roping Apache NiFi servers into a cryptomining botnet

8220 Gang Targets Telecom and Healthcare in Global Cryptojacking Attack

By Deeba Ahmed
The 8220 gang, believed to be of Chinese origins, was first identified in 2017 by Cisco Talos when they targeted Drupal, Hadoop YARN, and Apache Struts2 applications for propagating cryptojacking malware.
This is a post from HackRead.com… Continue reading 8220 Gang Targets Telecom and Healthcare in Global Cryptojacking Attack

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat.
The post First Dero cryptojacking campaign targets unprotected Kubernetes instances appeared fir… Continue reading First Dero cryptojacking campaign targets unprotected Kubernetes instances

Attackers increasingly using transfer.sh to host malicious code

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by Cado Labs researcher cannot be considered news. But one its elements po… Continue reading Attackers increasingly using transfer.sh to host malicious code

Covert cyberattacks on the rise as attackers shift tactics for maximum impact

2022 was the second-highest year on record for global ransomware attempts, as well as an 87% increase in IoT malware and a record number of cryptojacking attacks (139.3 million), according to SonicWall. “The past year reinforced the need for cybersecur… Continue reading Covert cyberattacks on the rise as attackers shift tactics for maximum impact

Cryptojackers Deploy Trojanized Mac Apps on The Pirate Bay

By Deeba Ahmed
All malicious apps for macOS identified by researchers were uploaded to The Pirate Bay by a user called “wtfisthat34698409672.”
This is a post from HackRead.com Read the original post: Cryptojackers Deploy Trojanized Mac Apps on The Pira… Continue reading Cryptojackers Deploy Trojanized Mac Apps on The Pirate Bay

How Falling Crypto Prices Impacted Cyber Crime

Some rare good news in the world of cyber crime trends: Certain crimes declined in 2022 after years of constant rises. Should we credit crypto? Some estimates say that cryptocurrencies have lost $2 trillion in value since November 2021. During that time, the costs associated with cyber crimes, such as ransomware payouts and financial scams, […]

The post How Falling Crypto Prices Impacted Cyber Crime appeared first on Security Intelligence.

Continue reading How Falling Crypto Prices Impacted Cyber Crime