08 Jan 2020

Cryptojacking Drops by 78% in Southeast Asia After INTERPOL Action

After intervention coordinated by the International Criminal Police Organization (INTERPOL), the number of routers infected with coin miners in Southeast Asia dropped by 78%. INTERPOL is an inter-governmental organization that joins police forces from 194 countries in combating crime in various regions across the globe. INTERPOL’s operation in Southeast Asia

Read More
27 Nov 2019

‘Dexphot’: A Sophisticated, Everyday Threat

A new report by Microsoft detailing the evolution of the Dexphot cryptomining malware highlights how even more everyday cyber threats are getting increasingly sophisticated. Dexphot was first detected in October of last year and has compromised tens of thousands of machines since then. While Dexphot has received relatively little attention,

Read More
08 Nov 2019

Microsoft Warns of More Harmful Windows BlueKeep Attacks, Patch Now

Research by Microsoft shows that the new campaign in which attackers exploit RDP instances vulnerable to the BlueKeep vulnerability in order to install cryptojacking malware, is likely tied to a cryptojacking campaign observed in September of this year. BlueKeep is a critical remote code execution flaw affecting RDP services on

Read More
04 Nov 2019

The First BlueKeep Mass Hacking Is Finally Here—but Don’t Panic

Threat actors are actively exploiting the critical BlueKeep flaw that impacts Remote Desktop Protocol (RDP) implementations on unpatched older Windows operating systems. Microsoft and other companies have warned that the flaw, tracked as CVE-2019-0708, is very dangerous because it could be used by attackers to carry out a massive attack

Read More
30 Oct 2019

The nastiest ransomware, phishing and botnets of 2019

According to a new Webroot report, the nastiest ransomware threat of 2019 was the Emotet – Trickbot – Ryuk attack chain that resulted in massive financial losses for targeted organizations. The Trickbot – Ryuk combination also features on the list separately, taking the second spot. Other top ransomware threats were

Read More
18 Oct 2019

European Airport Systems Infected With Monero-Mining Malware

Researchers with Cyberbit recently detected cryptojacking malware infections on over half of all computing systems at an undisclosed international airport in Europe. Cryptojacking refers to the illegitimate use of a system’s resourcing powers for mining cryptocurrency. In this case, the malware was mining Monero cryptocurrency. The malware had made its

Read More
17 Oct 2019

.WAVs Hide Malware in Their Depths in Innovative Campaign

Security researchers with BlackBerry Cylance have spotted a new sophisticated campaign that spreads cryptojacking malware and a backdoor via .WAV audio files. The malware is embedded in the audio data and loaded when an infected file is played. Some of the malicious audio samples played music without glitches, while others

Read More
17 Oct 2019

‘Graboid’ Crypto-Jacking Worm Targets Docker Hosts

Threat actors are taking advantage of Internet-facing unsecured Docker engines in order to distribute a cryptojacking worm, researchers with Palo Alto Networks have discovered. The malware is called Graboid and is capable infecting Docker containers that lack authentication and subsequently use the local processing resources to mine for Monero cryptocurrency.

Read More
19 Sep 2019

Smominru Mining Botnet In Cyber Turf War With Rival Malware

New research by Guardicore sheds light on the evolution of the Smominru mining botnet that infected over 500,000 devices last year. Last month, the botnet added 90,000 new victims to its tally and currently continues to grow at around 4.7 infections per day. It mostly targets Windows 7 and Windows

Read More
30 Aug 2019

Indictment of Capital One suspect alleges breaches of 30 companies, cryptojacking

The US Department of Justice (DoJ) is charging Paige Thompson, the person thought to be behind the massive Capital One data breach, with obtaining unauthorized access to the data of over 30 companies and of launching cryptojacking attacks on compromised company networks. Cryptojacking refers to the illegitimate use of a

Read More