Kinsing Crypto Malware Targets Linux Systems via Apache ActiveMQ Flaw

By Deeba Ahmed
Patches for all affected versions of Apache ActiveMQ have been released, and clients are strongly advised to upgrade their systems.
This is a post from HackRead.com Read the original post: Kinsing Crypto Malware Targets Linux Systems via… Continue reading Kinsing Crypto Malware Targets Linux Systems via Apache ActiveMQ Flaw

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Continue reading EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Qubitstrike Malware Hits Jupyter Notebooks for Cryptojacking and Cloud Data

By Deeba Ahmed
Qubitstrike Malware Uses Discord for C2 Communications in Cryptojacking Campaign Targeting Jupyter Notebooks.
This is a post from HackRead.com Read the original post: Qubitstrike Malware Hits Jupyter Notebooks for Cryptojacking and Cloud… Continue reading Qubitstrike Malware Hits Jupyter Notebooks for Cryptojacking and Cloud Data

Popular Thesaurus Website Used in Sneaky Cryptojacking Scheme

By Waqas
KEY FINDINGS Cybersecurity researchers at Group-IB unearthed a covert cryptojacking campaign concealed within a popular online thesaurus boasting…
This is a post from HackRead.com Read the original post: Popular Thesaurus Website Used in… Continue reading Popular Thesaurus Website Used in Sneaky Cryptojacking Scheme

Stealthy ‘LabRat’ Campaign Abuses TryCloudflare to Hide Infrastructure

The ‘LabRat’ cryptomining and proxyjacking operation relies on signature-based tools and stealthy cross-platform malware, and abuses TryCloudflare to hide its C&Cs.
The post Stealthy ‘LabRat’ Campaign Abuses TryCloudflare to Hide Infra… Continue reading Stealthy ‘LabRat’ Campaign Abuses TryCloudflare to Hide Infrastructure

Cryptomining and Malware Flourish on Misconfigured Kubernetes Clusters

By Habiba Rashid
Aquasec Investigation Exposes Alarming Rise in Kubernetes Misconfigurations Leading to Catastrophic Breaches.
This is a post from HackRead.com Read the original post: Cryptomining and Malware Flourish on Misconfigured Kubernetes Clusters
Continue reading Cryptomining and Malware Flourish on Misconfigured Kubernetes Clusters

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat. Continue reading Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

Patched OpenSSH Exploited for IoT, Linux Cryptomining

By Deeba Ahmed
According to Microsoft, the new campaign is ongoing and uses a backdoor to install a patched version of OpenSSH to hijack targeted devices.
This is a post from HackRead.com Read the original post: Patched OpenSSH Exploited for IoT, Linux… Continue reading Patched OpenSSH Exploited for IoT, Linux Cryptomining

North Korean hackers turn to ‘cloud mining’ for crypto to avoid law enforcement scrutiny

Researchers at Mandiant identified a new hacking group knowns as APT 43 that uses stolen bitcoin to fund cyberespionage operations.

The post North Korean hackers turn to ‘cloud mining’ for crypto to avoid law enforcement scrutiny appeared first on CyberScoop.

Continue reading North Korean hackers turn to ‘cloud mining’ for crypto to avoid law enforcement scrutiny