Blog News Cryptocurrency -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog



Datum

Název

Info

Blog

Companies

18.12.18

Connecting the dots between recently active cryptominers

Through Cisco Talos' investigation of illicit cryptocurrency mining campaigns in the past year, we began to notice that many of these campaigns shared remarkably similar TTPs, which we at first mistakenly interpreted as being attributed to a single actor.

Cryptocurrency blogCisco Talos
18.12.18

As Cryptocurrency Crash Continues, Will Mining Threat Follow?

As 2018 draws to a close, one technology has definitively left its mark on the year: cryptocurrencies. Digital currencies started the year out strong after a meteoric rise toward the end of 2017. Since then, it's safe to say that cryptocurrencies have had a massive impact globally, especially on the threat landscape.

Cryptocurrency blogCisco Talos
15.12.18Bitcoin Bomb Scare Associated with Sextortion ScammersOrganizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities, schools and news outlets, among others. The attackers distributed malicious emails claiming to have placed some type of explosive materials in the recipient's building.Cryptocurrency blogCisco Talos
29.11.18

KingMiner: The New and Improved CryptoJacker

Crypto-Mining attacks have grown and evolved in 18. Due to the rise in value and popularity of crypto currencies, hackers are increasingly motivated to exploit the CPU power of their victims’ machines for crypto-mining operations.Cryptocurrency blogCheckpoint
26.11.18New mining Trojan for Linux removes anti-virusesOne of today’s most common ways of obtaining illegal earnings is to mine cryptocurrency covertly, using the resources of a computer without the owner’s consent. Doctor Web recently discovered a miner that infects Linux devices. Cryptocurrency blogDr Web
8.11.18Supply-chain attack on cryptocurrency exchange gate.ioLatest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchangeCryptocurrency blogEset

27.9.18

The ‘Gazorp’ Dark Web Azorult Builder

On 17th September Check Point Research found a new online builder, dubbed ‘Gazorp’, hosted on the Dark Web. Gazorp is designed for building binaries of the popular malware, Azorult, an infostealer used for stealing user passwords, credit card information, cryptocurrency related data and more.

Cryptocurrency blog

Checkpoint

20.9.18

Fake finance apps on Google Play target users from around the world

Cybercrooks use bogus apps to phish six online banks and a cryptocurrency exchange

Cryptocurrency blog

Eset

20.9.18

One in three UK orgs hit by cryptojacking in previous month, survey finds

Conversely, only a little over one-third of IT executives believe that their systems have never been hijacked to surreptitiously mine digital currencies

Cryptocurrency blog

Eset

30.7.18

A Crypto Mining Operation UnmaskedIntroduction With the emerging threat of miners and the rise of cryptocurrencies that have taken the world by storm lately, Check Point Research has been keeping an eye out for mining campaigns. DuringCryptocurrency blog

Checkpoint

30.7.18

Jenkins Miner: One of the Biggest Mining Operations Ever DiscoveredThe Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these types of attacksCryptocurrency blogCheckpoint

30.7.18

‘RubyMiner’ Cryptominer Affects 30% of WW NetworksIn the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker attempted to exploit 30% of all networks worldwide.Cryptocurrency blogCheckpoint

30.7.18

Get Rich or Die Trying: A Case Study on the Real Identity behind a Wave of Cyber Attacks on Energy, Mining and Infrastructure Companies

Over the past 4 months, over 4,000 organizations globally have been targeted by cyber attacks which aim to infect their networks, steal data and commit fraud.  Many of these companies are leading international.

Cryptocurrency blog

Checkpoint

18

How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: The Growth of Miners

This blog post discusses the various trends that we have been observing related to cryptojacking activity.

Cryptocurrency blog

FireEye