cryptominer
Kingminer Botnet Keeps up with the Times
The e-currency boom in late 2017 sparked a new type of “gold rush”, as cyber-criminals started racing to infect home computers and data centers with crypto-miners. While digital currencies have fluctuated wildly ...
11-Plus Supercomputers Hacked With Cryptominers
High-performance computers across Europe have been shut down to clear out malware infestations. There’s also evidence of attacks in the US ...
Guardicore Labs: Vollgar Botnet Targets SQL Server DBs
Guardicore Labs this week published a report detailing how a malicious botnet has been using a brute force technique for nearly two years now to compromise systems running Microsoft SQL Server databases, ...
New “Norman” Malware Took Part in Large-Scale Cryptominer Infection
Researchers identified a large-scale cryptocurrency miner infection in which a new malware family called “Norman” took part. The Varonis Security Research team made the discovery while investigating a cryptominer infection at a ...
Thousands of Magento Sites Infected with Card Skimming Code
Over the past six months, a group of hackers has managed to break into more than 7,000 Magento-based online shops and infected them with malicious code that steals payment card information from ...
Researchers Uncover Massive Malvertising Operation
While analyzing recent drive-by download attacks, security researchers have uncovered a large malvertising operation that infiltrated the legitimate online ad ecosystem and abuses more than 10,000 compromised websites. Malicious advertising, or malvertising, ...
‘Hidden Bee’ miner delivered via improved drive-by download toolkit
Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign. Categories: Exploits Threat analysis Tags: bootkitcryptominerdrive-by attackexploithidden beehidden bee minerMBR (Read more...) The ...
Gentoo Repository Compromised Due to Weak Admin Password
The Gentoo Linux project has finished investigating the hacking last week of its GitHub-hosted package repository, an incident that resulted in attackers distributing malicious code to users. The point of entry turned ...
New Mac cryptominer uses XMRig
New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs. Categories: Mac Threat analysis Tags: ApplecryptominercryptominingmacMac cryptominerXMRig (Read more...) The post New Mac cryptominer uses XMRig appeared ...
Attackers Deliver Cryptominer to PostgreSQL Servers as Scarlett Johansson Pic
Security researchers have come across an attack against PostgreSQL servers that installs cryptominer malware that’s hidden in a picture of actress Scarlett Johansson. The unusual attack was captured in a honeypot by ...

