Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it’s impact on the Cybersecurity Community.
Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining
Wajahat Raja | | cloud-native environments, cryptocurrency mining, Cybersecurity News, GPU computational power, IoT botnet, weak SSH passwords
A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In ...
Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen)
Richi Jennings | | API exploit, blockchain, Crypto, cryptocurrencies, cryptocurrency, cryptocurrency exchange, DeFi, domain hijacking, Google Domains, imaginary money, Ponzi scheme, SB Blogwatch, smart contract, Smart Contract Security, smart contracts, Squarespace, Web3
DeFAIL: Cryptocurrency fans lose their worthless tokens via phishing attacks on decentralized finance sites ...
Security Boulevard
Commando Cat Docker Cryptojacking: Alert & Prevention Tips
Wajahat Raja | | Cloud Security, Commando Cat, Container Security, cryptocurrency mining, Cryptojacking prevention, cryptomining malware, cyber threat, Cyberattack prevention, Cybersecurity, Cybersecurity Best Practices, Cybersecurity News, Docker configuration, Docker cryptojacking, Docker monitoring, Docker remote API, Docker Security?, Docker vulnerabilities, Kaiten malware, Malware Detection, System performance impact, ZiggyStarTux malware
Recent reports have unveiled a concerning cyber threat orchestrated by a group identified as Commando Cat. This threat actor has been actively engaging in cryptojacking campaigns, leveraging vulnerabilities in Docker instances to ...
Alert: Palo Alto Networks Prey to RedTail Malware Exploits
Wajahat Raja | | Advanced Evasion Techniques, Akamai Security, cryptocurrency mining, Cryptojacking, CVE-2024-3400, Cyber Threats, Cybersecurity Alert, Cybersecurity News, enterprise cybersecurity, Firewall Exploit, Malware Detection, Nation-State Cyber Attacks, Network Security, Palo Alto Networks, PAN-OS Vulnerability, Private Mining Pools, RedTail Malware, security updates, Supply chain cyberattacks, threat actors, XMRig miner
In a recent development, threat actors behind the RedTail cryptojacking mining malware have expanded their arsenal by exploiting a newly disclosed IT infrastructure security flaw in Palo Alto Networks firewall exploit. This ...
GHOSTENGINE Exploit: Vulnerable Drivers Facing Attack
Wajahat Raja | | BYOVD, Command-and-Control (C2), Cryptojacking, Cyber Threats, Cybersecurity, Cybersecurity News, Elastic Security Labs, Endpoint Detection and Response (EDR), Exploit, GHOSTENGINE, Microsoft Defender Antivirus, persistence, PowerShell Script, security protocols, System Performance, vulnerability patching, Vulnerable drivers, XMRig miner
A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at the GHOSTENGINE ...
Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds
It took two brothers who went to MIT months to plan how they were going to steal, launder and hide millions of dollars in cryptocurrency -- and only 12 seconds to actually ...
Security Boulevard
Ukrainian REvil Hacker Gets 13-Year Sentence Plus $16M Fine
Wajahat Raja | | botnets, cryptocurrency, cybercrime, Cybersecurity, Cybersecurity Measures, Cybersecurity News, dark web, International Cooperation, law enforcement, Legal Proceedings, money laundering, Ransomware, rEvil, Sodinokibi, Ukrainian Hacker
In a significant victory against cybercrime, the Ukrainian REvil hacker has been sentenced to over 13 years in prison and ordered to pay a hefty fine of $16 million for orchestrating thousands ...
Backdoors and Miners Amid eScan Antivirus Backdoor Exploit
Wajahat Raja | | Antivirus software, Backdoor Exploit, cryptocurrency mining, cyber attacks, Cybersecurity, Cybersecurity News, Defense Sector, eScan Antivirus, Exploit Detection, GuptiMiner, Malware, Network Security, North Korean Hacking, security updates, Threat Intelligence, Vulnerabilities
Recently, a wave of malware attacks has surfaced, exploiting vulnerabilities in the update mechanism of the eScan antivirus software. This eScan antivirus backdoor exploit distributes backdoors and cryptocurrency miners, such as XMRig, ...
Crypto Mixer Money Laundering: Samourai Founders Arrested
Wajahat Raja | | Blockchain Analysis, Crypto Investigations, cryptocurrency, Cryptocurrency Anonymity, Cryptocurrency Regulations, Cybersecurity News, dark web, Digital Asset Security, Financial Crimes, Investor Protection, law enforcement, Market Integrity, money laundering, Regulatory Compliance, Samourai Wallet, Whirlpool Mixing Service
The recent crackdown on the crypto mixer money laundering, Samourai, has unveiled a sophisticated operation allegedly involved in facilitating illegal transactions and laundering criminal proceeds. The cryptocurrency community was shocked by the ...
Elliptic Shows How an AI Model Can Identify Bitcoin Laundering
The blockchain analysis company is using a deep learning model, new AI techniques, and a massive dataset to better detect and track money laundering on a Bitcoin blockchain ...
Security Boulevard