Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining

A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In ...

Backdoors and Miners Amid eScan Antivirus Backdoor Exploit

Recently, a wave of malware attacks has surfaced, exploiting vulnerabilities in the update mechanism of the eScan antivirus software. This eScan antivirus backdoor exploit distributes backdoors and cryptocurrency miners, such as XMRig, ...
Nuclear plant workers in Ukraine caught using “free” energy to mine cryptocurrency

Nuclear plant workers in Ukraine caught using “free” energy to mine cryptocurrency

Despite losing some steam in recent times, the cryptocurrency mining craze is still alive and kicking. Ukrainian local media reports that workers at a nuclear power plant have been caught mining cryptocurrency ...
LockFile ransomware

Gentoo Repository Compromised Due to Weak Admin Password

The Gentoo Linux project has finished investigating the hacking last week of its GitHub-hosted package repository, an incident that resulted in attackers distributing malicious code to users. The point of entry turned ...
Security Boulevard
coinbit

Study: More than 5 Percent of Monero Cryptocurrency was Mined by Malware

Unauthorized cryptocurrency mining has been one of the major malware trends this year, with attackers managing to mine more than 5 percent of Monero coins currently in circulation using abused devices. Researchers ...
Security Boulevard
RIG Exploit Kit Starts Using IE Zero-Day Flaw Patched in May

RIG Exploit Kit Starts Using IE Zero-Day Flaw Patched in May

The latest version of the RIG exploit kit, a tool used by cybercriminals to launch large-scale drive-by download attacks, is exploiting an Internet Explorer vulnerability that was patched by Microsoft last month ...
Security Boulevard
Top Target for Cryptomining

Higher Education a Top Target for Cryptomining

You know an internet-based technology is becoming more accepted into the mainstream when cybercriminals make it a target for attacks. We saw it with malware designed specifically for Apple products, and later ...
Security Boulevard
coinbit

Hackers Exploit Drupal Vulnerability to Install Cryptocurrency Miners

A highly critical vulnerability patched in the popular Drupal content management system two weeks ago is seeing a wave of exploits, some of which install cryptocurrency mining malware on servers. The vulnerability ...
Security Boulevard

Application Security Check Up