15 Apr 2019

The correlation between DDoS attacks and cryptomining

A new NSFOCUS report indicates that the declining price of cryptocurrencies in 2018 prompted threat actors to stop using botnet resources  for cryptomining attacks Рas these were getting less and less profitable Рand increasingly use them to launch distributed denial-of-service (DDoS) attacks instead. Despite this, the number of

Read More
12 Apr 2019

Tax Fraud and ID Theft Services Getting Cheaper on the Dark Web

New research by Carbon Black shows that the tax fraud and identity theft services that are offered on the dark web keep on getting cheaper. As a result, anyone with $1000 to spend will now be able to commit tax fraud through a streamlined process that involves purchasing info for

Read More
11 Apr 2019

Finance Remains Most Attacked Sector Globally Six of the Past Seven Years

A new NTT security report shows that 17% of all cyberattacks in the past year targeted the financial sector. The technology sector also accounted for 17% of attacks in 2018, but finance has been the most targeted industry for 6 of the last 7 years. Other highly targeted industries were

Read More
10 Apr 2019

China, a Major Bitcoin Source, Considers Moving Against It

China may eliminate its subsidized cryptomining industry in the near future. Cryptomining involves the use of the processing power of machines in order to solve complex math problems, by which cryptocurrencies are generated. The Chinese regime initially believed that investing in cryptomining could be beneficial to its economy, and therefore

Read More
10 Apr 2019

Coinhive stops digging, but cryptomining still dominates

A new Check Point report shows that despite the recent shutdown of Coinhive, a cryptomining software developed for legitimate purposes but frequently used for nefarious purposes by criminals, cryptominers are still among the most common malware targeting organizations across the globe. A cryptominer is malware that hijacks the processing power

Read More
03 Apr 2019

Cryptojacking Still a Foreign Concept for Many Security Pros

Even though cryptojacking, i.e. the illegitimate use of a system’s resourcing powers for mining cryptocurrency, is a serious threat to organizations, a new survey by Exabeam found that a majority (57%) of infosec professionals don’t even know what it is. In addition, 65% of respondents were not familiar with shadow

Read More
02 Apr 2019

Terrorist Use of Cryptocurrencies – Technical and Organizational Barriers and Future Threats

New research by RAND’s National Security Research Division (NSRD) scrutinizes the use of cryptocurrencies in the context of terrorist activities. While it is not currently viable for terrorist groups to exclusively rely on cryptocurrencies for their financial transactions, the researchers believe that this may change in the future. The study

Read More
28 Mar 2019

North Korean hackers continue attacks on cryptocurrency businesses

A new report by Kaspersky Lab indicates that the North Korean state-backed hacking group known as Lazarus is still targeting cryptocurrency exchanges and crypto companies in order to steal cryptocurrency. Last year, the cybersecurity firm already detected this type of hacking activity by North Korean threat actors. Just like before,

Read More
12 Mar 2019

Cryptominers Remain Top Threat but Coinhive’s Exit Could Change That

A new report by Check Point shows that cryptominers, i.e. malware that hijacks the processing power of infected systems in order to mine cryptocurrency, remained the dominant malware threat in February. As was true throughout 2018, the number one threat was Coinhive, a cryptomining software developed for legitimate purposes but

Read More
11 Feb 2019

First clipper malware discovered on Google Play

Researchers with ESET have found a malicious app designed to steal cryptocurrency in the Google Play Store. The app, which mimicked MetaMask, a legitimate service for running Ethereum-supported applications in a browser, has been removed from the Play Store after the researchers alerted Google. The app ran a form of

Read More