Blog News Cryptocurrency -  

Úvod  APT blog  Attack blog  BigBrother blog  BotNet blog  Bug blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  Hardware blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransomware blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog



Datum

Název

Info

Blog

Companies

17.3.19

“CryptoSink” Campaign Deploys a New Miner Malware

Recently, threat researchers from F5 Networks spotted a new campaign targeting Elasticsearch systems. It leverages an exploit from 2014 to spread several new malwares designed to deploy an XMR (Monero) mining operation.

Cryptocurrency blog

F5 Labs

14.3.19

Several Cryptojacking Apps Found on Microsoft Store On January 17, we discovered several potentially unwanted applications (PUAs) on the Microsoft Store that surreptitiously use the victim’s CPU power to mine cryptocurrency. We reported these apps to Microsoft and they subsequently removed them from their store. Cryptocurrency blog Symantec
3.3.19 Coinhive cryptocurrency miner to call it a day next week The service became notorious for its use by ne’er-do-wells looking to make a quick buck by hijacking the processing power of victim machines to generate virtual money Cryptocurrency blog

Eset

3.3.19 ‘Highly critical’ bug exposes unpatched Drupal sites to attacks Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads Cryptocurrency blog

Eset

17.2.19 First clipper malware discovered on Google Play Cryptocurrency stealers that replace a wallet address in the clipboard are no longer limited to Windows or shady Android app stores Cryptocurrency blog Eset

28.1.19

Cryptocurrency and Blockchain Networks: Facing New Security Paradigms Blockchain technology offers the promise of enhanced security, but also presents its own challenges.Cryptocurrency blog

FireEye

21.1.19 NRSMiner updates to newer version More than a year after the world first saw the Eternal Blue exploit in action during the May 2017 WannaCry outbreak, we are still seeing unpatched machines in Asia being infected by malware that uses the exploit to spread. Cryptocurrency blog F-Secure Blog
18.12.18

Connecting the dots between recently active cryptominers

Through Cisco Talos' investigation of illicit cryptocurrency mining campaigns in the past year, we began to notice that many of these campaigns shared remarkably similar TTPs, which we at first mistakenly interpreted as being attributed to a single actor.

Cryptocurrency blog Cisco Talos
18.12.18

As Cryptocurrency Crash Continues, Will Mining Threat Follow?

As 2018 draws to a close, one technology has definitively left its mark on the year: cryptocurrencies. Digital currencies started the year out strong after a meteoric rise toward the end of 2017. Since then, it's safe to say that cryptocurrencies have had a massive impact globally, especially on the threat landscape.

Cryptocurrency blog Cisco Talos
15.12.18 Bitcoin Bomb Scare Associated with Sextortion Scammers Organizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities, schools and news outlets, among others. The attackers distributed malicious emails claiming to have placed some type of explosive materials in the recipient's building. Cryptocurrency blog Cisco Talos
29.11.18

KingMiner: The New and Improved CryptoJacker

Crypto-Mining attacks have grown and evolved in 18. Due to the rise in value and popularity of crypto currencies, hackers are increasingly motivated to exploit the CPU power of their victims’ machines for crypto-mining operations. Cryptocurrency blog Checkpoint
26.11.18 New mining Trojan for Linux removes anti-viruses One of today’s most common ways of obtaining illegal earnings is to mine cryptocurrency covertly, using the resources of a computer without the owner’s consent. Doctor Web recently discovered a miner that infects Linux devices. Cryptocurrency blog Dr Web
8.11.18 Supply-chain attack on cryptocurrency exchange gate.io Latest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchange Cryptocurrency blog Eset

27.9.18

The ‘Gazorp’ Dark Web Azorult Builder

On 17th September Check Point Research found a new online builder, dubbed ‘Gazorp’, hosted on the Dark Web. Gazorp is designed for building binaries of the popular malware, Azorult, an infostealer used for stealing user passwords, credit card information, cryptocurrency related data and more.

Cryptocurrency blog

Checkpoint

20.9.18

Fake finance apps on Google Play target users from around the world

Cybercrooks use bogus apps to phish six online banks and a cryptocurrency exchange

Cryptocurrency blog

Eset

20.9.18

One in three UK orgs hit by cryptojacking in previous month, survey finds

Conversely, only a little over one-third of IT executives believe that their systems have never been hijacked to surreptitiously mine digital currencies

Cryptocurrency blog

Eset

30.7.18

A Crypto Mining Operation Unmasked Introduction With the emerging threat of miners and the rise of cryptocurrencies that have taken the world by storm lately, Check Point Research has been keeping an eye out for mining campaigns. During Cryptocurrency blog

Checkpoint

30.7.18

Jenkins Miner: One of the Biggest Mining Operations Ever Discovered The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these types of attacks Cryptocurrency blog Checkpoint

30.7.18

‘RubyMiner’ Cryptominer Affects 30% of WW Networks In the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker attempted to exploit 30% of all networks worldwide. Cryptocurrency blog Checkpoint

30.7.18

Get Rich or Die Trying: A Case Study on the Real Identity behind a Wave of Cyber Attacks on Energy, Mining and Infrastructure Companies

Over the past 4 months, over 4,000 organizations globally have been targeted by cyber attacks which aim to infect their networks, steal data and commit fraud.  Many of these companies are leading international.

Cryptocurrency blog

Checkpoint

18

How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: The Growth of Miners

This blog post discusses the various trends that we have been observing related to cryptojacking activity.

Cryptocurrency blog

FireEye