cryptocurrency mining
Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining
A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In ...
Commando Cat Docker Cryptojacking: Alert & Prevention Tips
Recent reports have unveiled a concerning cyber threat orchestrated by a group identified as Commando Cat. This threat actor has been actively engaging in cryptojacking campaigns, leveraging vulnerabilities in Docker instances to ...
Alert: Palo Alto Networks Prey to RedTail Malware Exploits
In a recent development, threat actors behind the RedTail cryptojacking mining malware have expanded their arsenal by exploiting a newly disclosed IT infrastructure security flaw in Palo Alto Networks firewall exploit. This ...
Backdoors and Miners Amid eScan Antivirus Backdoor Exploit
Recently, a wave of malware attacks has surfaced, exploiting vulnerabilities in the update mechanism of the eScan antivirus software. This eScan antivirus backdoor exploit distributes backdoors and cryptocurrency miners, such as XMRig, ...
Nuclear plant workers in Ukraine caught using “free” energy to mine cryptocurrency
Despite losing some steam in recent times, the cryptocurrency mining craze is still alive and kicking. Ukrainian local media reports that workers at a nuclear power plant have been caught mining cryptocurrency ...
Gentoo Repository Compromised Due to Weak Admin Password
The Gentoo Linux project has finished investigating the hacking last week of its GitHub-hosted package repository, an incident that resulted in attackers distributing malicious code to users. The point of entry turned ...
Study: More than 5 Percent of Monero Cryptocurrency was Mined by Malware
Unauthorized cryptocurrency mining has been one of the major malware trends this year, with attackers managing to mine more than 5 percent of Monero coins currently in circulation using abused devices. Researchers ...
RIG Exploit Kit Starts Using IE Zero-Day Flaw Patched in May
The latest version of the RIG exploit kit, a tool used by cybercriminals to launch large-scale drive-by download attacks, is exploiting an Internet Explorer vulnerability that was patched by Microsoft last month ...
Higher Education a Top Target for Cryptomining
You know an internet-based technology is becoming more accepted into the mainstream when cybercriminals make it a target for attacks. We saw it with malware designed specifically for Apple products, and later ...
Hackers Exploit Drupal Vulnerability to Install Cryptocurrency Miners
A highly critical vulnerability patched in the popular Drupal content management system two weeks ago is seeing a wave of exploits, some of which install cryptocurrency mining malware on servers. The vulnerability ...