19 Sep 2019

Smominru Mining Botnet In Cyber Turf War With Rival Malware

New research by Guardicore sheds light on the evolution of the Smominru mining botnet that infected over 500,000 devices last year. Last month, the botnet added 90,000 new victims to its tally and currently continues to grow at around 4.7 infections per day. It mostly targets Windows 7 and Windows

Read More
30 Aug 2019

Indictment of Capital One suspect alleges breaches of 30 companies, cryptojacking

The US Department of Justice (DoJ) is charging Paige Thompson, the person thought to be behind the massive Capital One data breach, with obtaining unauthorized access to the data of over 30 companies and of launching cryptojacking attacks on compromised company networks. Cryptojacking refers to the illegitimate use of a

Read More
29 Aug 2019

Avast Maker Team WIth Police To Free 850,000 Computers From Cryptomining Malware

In a collaborative effort, security researchers with Avast and the French police took down a massive cryptomining botnet earlier this year. The botnet consisted of 850,000 machines that were infected with Retadup, a malware strain designed to mine Monero (XMR) and in some cases to log keystrokes and take screenshots.

Read More
15 Aug 2019

Norman Cryptominer Employs Sophisticated Obfuscation Tactics

Security researchers with Varonis have spotted a sophisticated new strain of cryptomining malware that uses various obfuscation tactics in order to avoid detection. The researchers describe the cryptominer, dubbed “Norman,”  as “a high-performance miner for Monero cryptocurrency,” that distinguishes itself from other miners in the way it “employs evasion techniques

Read More
08 Aug 2019

Smominru hijacks half a million PCs to mine cryptocurrency, steals access data for Dark Web sale

  Carbon Black researchers are tracking a cryptomining campaign that has already infected more that 500,000 machines with Smominru malware that enslaves them into a massive botnet. According to a new report[pdf], the infected machines are used to mine Monero (XMR) and the malware is also capable of “access mining,”

Read More
05 Jul 2019

New Golang malware plays the Linux field in quest for cryptocurrency

Palo Alto Networks researchers have discovered a new strain of cryptojacking malware written in the Go programming language. The malware, dubbed Golang, uses the resourcing powers of infected systems in order to mine Monero (XMR) cryptocurrency. Golang targets Linux servers and is capable of compromising machines in a variety of

Read More
19 Jun 2019

Modular Backdoor Can Spread Over Local Network

A new report by Kaspersky provides insight into Plurox, a highly sophisticated piece of malware first discovered in February. Plurox is a modular backdoor capable of distributing itself across networks and of planting additional malware on infected machines. Multi-functional “modular” malware is a growing threat to organizations. Plurox can infiltrate

Read More
14 Jun 2019

Ransomware rebounding in popularity as cryptojacking loses steam

Ransomware campaigns surged by 167% between Q4 of last year and the first three months of 2019, new research by Positive Technologies shows. Ransomware now accounts for 24% of all cyberattacks, up from 9% in Q4 of 2018. The resurgence of ransomware coincides with a drop in cryptojacking, i.e. the

Read More
22 May 2019

Massive DDoS attacks lasting more than an hour increased 487% in 2019

New Kaspersky Lab research shows that distributed denial-of-service (DDoS) attacks surged by 84% in the first three months of this year. This growth reverses the downward trend that was recorded throughout 2018. Compared to the first quarter of last year, larger attacks involving 100Gbps or more increased by a staggering

Read More
20 May 2019

Ransomware and malware attacks decline, attackers adopting covert tactics

New figures released by Microsoft indicate that global ransomware attacks fell by 60% between March and December of last year, while malware attacks declined in general. Instead, threat actors are launching campaigns that rely on more covert attack techniques such as phishing and social engineering in general. Cyber criminals also

Read More