Thousands of Magento Sites Infected with Card Skimming Code

Over the past six months, a group of hackers has managed to break into more than 7,000 Magento-based online shops and infected them with malicious code that steals payment card information from customers. According to security consultant Willem de Gro… Continue reading Thousands of Magento Sites Infected with Card Skimming Code

ZombieBoy cryptomining malware exploits CVEs to evade detection

By Waqas
ZombieBoy malware makes $1,000 Monero on a monthly basis. An independent security expert James Quinn has discovered a new family of cryptominers that has been dubbed as ZombieBoy. According to Quinn’s analysis, the newly discovered cryptominin… Continue reading ZombieBoy cryptomining malware exploits CVEs to evade detection

Researchers Uncover Massive Malvertising Operation

While analyzing recent drive-by download attacks, security researchers have uncovered a large malvertising operation that infiltrated the legitimate online ad ecosystem and abuses more than 10,000 compromised websites. Malicious advertising, or malver… Continue reading Researchers Uncover Massive Malvertising Operation

‘Hidden Bee’ miner delivered via improved drive-by download toolkit

Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign.
Categories:

Exploits
Threat analysis

Tags: bootkitcryptominerdrive-by attackexploithidden beehidden bee minerMBR

(Read more…… Continue reading ‘Hidden Bee’ miner delivered via improved drive-by download toolkit

Gentoo Repository Compromised Due to Weak Admin Password

The Gentoo Linux project has finished investigating the hacking last week of its GitHub-hosted package repository, an incident that resulted in attackers distributing malicious code to users. The point of entry turned out to be a weak admin password t… Continue reading Gentoo Repository Compromised Due to Weak Admin Password

New Mac cryptominer uses XMRig

New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs.
Categories:

Mac
Threat analysis

Tags: ApplecryptominercryptominingmacMac cryptominerXMRig

(Read more…)

The post New Mac cryptominer uses XMRig ap… Continue reading New Mac cryptominer uses XMRig