cryptomining
Are you listening to your logs? Part 3: High disk usage
In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk ...
VictoryGate Monero-Mining Botnet Spread via Infected USB Devices
A previously undocumented botnet called “VictoryGate” propagated via infected USB devices in order to perform Monero-mining functionality. Slovakian security firm ESET revealed that it had sinkholed several command-and-control (C&C) domains so that ...
BlueKeep Panic as RCE RDP Exploit Floods the Net
RDP, Microsoft's Remote Desktop Protocol, is now coming under attack from hackers trying to spread cryptomining malware ...
CookieMiner malware targets Macs, steals passwords and SMS messages, mines for cryptocurrency
Mac users can't ignore the need to protect their computers from malware with up-to-date anti-virus software and other security tools. The post CookieMiner malware targets Macs, steals passwords and SMS messages, mines ...
Joint Effort Neutralized Over 850K Infections of Retadup Worm
A joint investigatory effort neutralized more than 850,000 unique infections of Retadup, a worm known for targeting Windows machines in Latin America. In March 2019, Avast came across an interesting cryptomining payload ...
Browser Push Notifications: Useful Feature Exploited by Deceptive Marketers
Pop-ups and browser lockers have given way to irritating and potentially destructive push notifications For many of us, when we hear the word “malware,” the first thing that comes to mind would ...
Have Crypto-Miners Infiltrated Your Public Cloud?
How do you know if bad actors are siphoning off your power and racking up huge bills for your organization? These silent malware scripts could be infecting your public cloud infrastructure right ...
Modular Plurox Backdoor Comes with Cryptomining, Worm-Like Plugins
A new modular backdoor detected as “Plurox” comes with multiple plugins that expand its capabilities to include cryptomining and worm-like behavior. In February 2019, Kaspersky Lab’s researchers first detected the backdoor. Their ...
Cyberthreats Your Business Isn’t Prepared For
You have backups in the event your business is hit by ransomware. You have prepared PR statements should there be any kind of customer data breach. You have been careful to keep ...
Coinhive shuts down | Avast
Cryptojacking stole the limelight away from ransomware at the end of 2017, becoming a major cyberthreat that continued into 2018. On March 8, 2019 Coinhive, the service that enables websites around the ...

