Blog News Cryptocurrency -
Úvod APT blog Attack blog BigBrother blog BotNet blog Bug blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog Hardware blog ICS blog Incident blog IoT blog Malware blog Phishing blog Ransomware blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
Through Cisco Talos' investigation of illicit cryptocurrency mining campaigns in the past year, we began to notice that many of these campaigns shared remarkably similar TTPs, which we at first mistakenly interpreted as being attributed to a single actor.
|Cryptocurrency blog||Cisco Talos|
As 2018 draws to a close, one technology has definitively left its mark on the year: cryptocurrencies. Digital currencies started the year out strong after a meteoric rise toward the end of 2017. Since then, it's safe to say that cryptocurrencies have had a massive impact globally, especially on the threat landscape.
|Cryptocurrency blog||Cisco Talos|
|15.12.18||Bitcoin Bomb Scare Associated with Sextortion Scammers||Organizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities, schools and news outlets, among others. The attackers distributed malicious emails claiming to have placed some type of explosive materials in the recipient's building.||Cryptocurrency blog||Cisco Talos|
KingMiner: The New and Improved CryptoJacker
|Crypto-Mining attacks have grown and evolved in 18. Due to the rise in value and popularity of crypto currencies, hackers are increasingly motivated to exploit the CPU power of their victims’ machines for crypto-mining operations.||Cryptocurrency blog||Checkpoint|
|26.11.18||New mining Trojan for Linux removes anti-viruses||Cryptocurrency blog||Dr Web|
|8.11.18||Supply-chain attack on cryptocurrency exchange gate.io||Latest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchange||Cryptocurrency blog||Eset|
On 17th September Check Point Research found a new online builder, dubbed ‘Gazorp’, hosted on the Dark Web. Gazorp is designed for building binaries of the popular malware, Azorult, an infostealer used for stealing user passwords, credit card information, cryptocurrency related data and more.
Cybercrooks use bogus apps to phish six online banks and a cryptocurrency exchange
Conversely, only a little over one-third of IT executives believe that their systems have never been hijacked to surreptitiously mine digital currencies
|A Crypto Mining Operation Unmasked||Introduction With the emerging threat of miners and the rise of cryptocurrencies that have taken the world by storm lately, Check Point Research has been keeping an eye out for mining campaigns. During||Cryptocurrency blog|
|Jenkins Miner: One of the Biggest Mining Operations Ever Discovered||The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these types of attacks||Cryptocurrency blog||Checkpoint|
|‘RubyMiner’ Cryptominer Affects 30% of WW Networks||In the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker attempted to exploit 30% of all networks worldwide.||Cryptocurrency blog||Checkpoint|
Over the past 4 months, over 4,000 organizations globally have been targeted by cyber attacks which aim to infect their networks, steal data and commit fraud. Many of these companies are leading international.
This blog post discusses the various trends that we have been observing related to cryptojacking activity.