Obfuscated JavaScript Cryptominer

During an incident response investigation, we detected an interesting piece of heavily obfuscated JavaScript malware. Once decoded, we found out that cryptominers were running on visitor’s computers when they accessed our customer’s w… Continue reading Obfuscated JavaScript Cryptominer

An Old Trick with a New Twist: Cryptomining Through Disguised URL Shorteners

As we have previously discussed on this blog, surreptitious cryptomining continues to be a problem as new methods emerge to both evade and hasten the ease of mining at the expense of system administrators, website owners, and their visitors.
Another W… Continue reading An Old Trick with a New Twist: Cryptomining Through Disguised URL Shorteners

400 popular Drupal based websites hacked to mine cryptocurrency

By Waqas
Vulnerability in Drupal CMS Converted Popular Websites into Monero mining
This is a post from HackRead.com Read the original post: 400 popular Drupal based websites hacked to mine cryptocurrency
Continue reading 400 popular Drupal based websites hacked to mine cryptocurrency

Magento sites hacked with cryptominers & credential stealing malware

By Waqas
At least 1,000 Magento based websites including shops have been
This is a post from HackRead.com Read the original post: Magento sites hacked with cryptominers & credential stealing malware
Continue reading Magento sites hacked with cryptominers & credential stealing malware

Malicious cryptomining and the blacklist conundrum

When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult.
Categories:

Cryptomining
Threat analysis

Tags: adblockersblacklistcoinhivecryptominerscryptominingGitHub

(… Continue reading Malicious cryptomining and the blacklist conundrum

RIG exploit kit campaign gets deep into crypto craze

We take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more … Continue reading RIG exploit kit campaign gets deep into crypto craze

Malicious Website Cryptominers from GitHub. Part 2.

Recently we wrote about how GitHub/GitHub.io was used in attacks that injected cryptocurrency miners into compromised websites. Around the same time, we noticed another attack that also used GitHub for serving malicious code.
Encrypted CoinHive Miner … Continue reading Malicious Website Cryptominers from GitHub. Part 2.

Cryptominers – The Next Generation

In less than a decade, cryptocurrency became almost mainstream. Many people are familiar with Bitcoin, which was the first decentralized digital currency. In fact, there are more than 10 different cryptocurrencies with a market cap exceeding 1 billion US dollars. Some are very similar, but others significantly differ in the mathematical and computational properties of […]… Read More

The post Cryptominers – The Next Generation appeared first on The State of Security.

The post Cryptominers – The Next Generation appeared first on Security Boulevard.

Continue reading Cryptominers – The Next Generation