Norman Cryptominer Employs Sophisticated Obfuscation Tactics
A new XMRig Monero cryptominer stands apart, despite its non-flashy name. Continue reading Norman Cryptominer Employs Sophisticated Obfuscation Tactics
Collaborate Disseminate
A new XMRig Monero cryptominer stands apart, despite its non-flashy name. Continue reading Norman Cryptominer Employs Sophisticated Obfuscation Tactics
A Tiny Core Linux 9.0 image configured to run XMRig runs on a VM, rather than victim machines hosting the malware locally. Continue reading LoudMiner Cryptominer Uses Linux Image and Virtual Machines
Since March, criminals have been using hacking tools that were reportedly stolen from the National Security Agency in targeting companies around the world as part of a cryptomining campaign, researchers with cybersecurity company Trend Micro said Thursday. The broad-brush campaign has hit organizations in the banking, manufacturing and education sectors, among others, Trend Micro says. The criminals are essentially hijacking corporate computing power to harvest the cryptocurrency Monero. It’s hardly a new concept, but in this case it’s a reminder that tools deployed by state-sponsored hackers can also be used by relatively unskilled crooks more interested in making money than in spying. “Entry-level cybercriminals are gaining easy access to what we can consider ‘military-grade’ tools — and are using them for seemingly ordinary cybercrime activity,” Trend Micro researchers wrote in a blog post. The attacks are exploiting old versions of Microsoft Windows using a variant of a backdoor based on the EternalBlue exploit, Trend Micro said. EternalBlue is code reportedly […]
The post Criminal campaign uses leaked NSA tools to set up cryptomining scheme, Trend Micro says appeared first on CyberScoop.
A Monero cryptominer made a home on an Apache Tomcat server and just wouldn’t stay away. Continue reading The cryptominer that kept coming back
As Bitcoin prices surge, so too are malicious apps, malware-ridden scams and cryptojacking attacks looking to profit from the cryptocurrency industry. Continue reading Soaring Cryptocurrency Prices Draw Malicious New Onslaught of Apps, Malware
By Ryan De Souza
EternalBlue and DoublePulsar hacking tools are back in action. Symantec security researchers have identified that cybercriminals are still utilizing the classified exploits/hacking tools of the National Security Agency (NSA), which wer… Continue reading Thousands of firms hit by Beapy malware using NSA hacking tools
A recently-disclosed vulnerability in the Docker containerisation platform is being exploited by cybercriminals to mine the Monero (XMR) cryptocurrency on hundreds of servers. Continue reading Monero cryptominers hijack hundreds of unpatched Docker hosts
By Waqas
The Pirate Bay was caught twice secretly mining Monero cryptocurrency using Javascript powered by Coinhive. Popular in-browser crypto-mining service will be shutting down from March 9th, 2019 much to the dismay of hackers who loved it quite ar… Continue reading The Pirate Bay’s preferred cryptominer Coinhive shutting down next week
The controversial cryptomining service is shutting down. Continue reading Coinhive to Mine Its Last Monero in March
“To be completely honest, it isn’t economically viable anymore,” says Coinhive.
Read more in my article on the Tripwire State of Security blog.
Continue reading Coinhive, the in-browser cryptomining service beloved by hackers, is dead