An ongoing malware campaign that attempts to exploit web servers susceptible to the Drupalgeddon 2.0 bug in order to infect them with an XMRig-based cryptominer has generated around $11,000 in profits since commencing last April and peaking on May 20.
Cryptocurrency service Bancor robbed of millions; MyEtherWallet users targeted via malicious VPN Chrome extension
Cryptocurrency token conversion service Bancor disclosed yesterday that hackers stole millions in coins from one of its online wallets, while Etherium crypto wallet service MyEtherWallet warned that hackers may have compromised anyone who accessed its service while using the free VPN service Hola and its Chrome extension.
The Pirate Bay (TPB) has started notifying its users that just by entering the site they give the peer-to-peer sharing site the go-ahead to use their CPU to mine cryptocurrency, this after TPB was again caught using its customers to mine Monero without their knowledge.
A cryptojacking operation that injects legitimate websites with secret Coinhive shortlinks was recently discovered to be part of an even larger malicious infrastructure that redirects innocent site visitors to servers that distribute both web-based and standard cryptominers.
The five-year-old Trojan-Ransom.Win32.Rakhni family has received a facelift that now allows it to decide whether or not to install its traditional ransomware or to drop a cryptominer instead.
Researchers have uncovered a malware bot that infects Linux-based servers and connected devices with a cryptominer that appears to transfer funds to the operators of a Chinese money-making scam website.
An updated version of the Smoke Loader malware downloader has been sampled in the wild and was found to contain one of the first successful uses of the PROPagate injection technique uses in an actual attack.
Another chink has developed in the usually tough Apple OS ability to ward off cybersecurity issues with a new cryptocurrency miner being discovered that is hitting macOS devices.
A recently discovered a DNS hijacking campaign that was found spreading banking trojan malware to Android smartphone users largely in Asia has expanded it reach to iOS and PC users as well, while targeting speakers of 27 different languages.
Computers users infected with the newly observed cryptojacking malware WinstarNssmMiner will be surprised to discover that the nasty malware crashes their machines if they try to terminate the program, making it difficult to remove.
Nearly 400 websites running outdated and vulnerable versions of the Drupal content management system, many affiliated with governments and educational institutions, were recently discovered to be running cryptomining programs without their operators' knowledge.
Using honeypots, internet scanning and connections to active nodes, researchers have estimated that anywhere from 0.6 to two percent of the entire Bitcoin network engages in suspicious or malicious behavior on a given day.
Researchers have discovered a versatile cryptominer worm that propagates itself by exploiting vulnerabilities in Microsoft's SMBv1 server, Oracle's WebLogic Server and Apache Struts, as well as by brute force attacking Microsoft SQL servers.
Looking to get the jump on Bitvote (BTV), a forked version of Bitcoin that launched just last January, attackers recently distributed a trojanized calculator app that downloads a cryptominer targeting the new cryptocurrency.
Two Italian researchers from the University of Padua have compiled an estimate of how much money, in bitcoin, has been generated by the various types of ransomware used by cybercriminals.
Cryptomining is certainly one of the buzzwords flying around the exhibition halls and meeting rooms at RSA 2018, but with the currency's long-term viability directly tied to its value at least one cybersecurity exec thinks this criminal activity's time could be limited.
It should come as no surprise to anyone in the cybersecurity industry that cryptocurrency mining is increasing at an incredible rate, but the rate of increase might come as a surprise.
Three leading cybersecurity research teams separately released reports today about recent malicious cryptomining activity -- one revealed the compromise a major ad platform, another analyzed an emerging malware that infected at least 166,000 users worldwide, and a third focused on a large crop of Android-based miners.
A new group of cryptocurrency miners is using a function normally found in SLocker Android ransomware to add self-protection and persistence to what Trend Micros is calling HiddenMiner.
The malicious actors who installed and ran a cryptocurrency mining operation on hacked Tesla ASW servers and Jenkins servers is now targeting servers running Linux and has so far generated more than $74,000 in Monero.
Google this week updated its financial services policy, effective June 2018, to prohibit the advertising of cryptocurrencies and related content.
Cryptocurrency miners are seemingly working away under every rock on the internet and there is a good reason. It's an almost guaranteed payday with a much-reduced chance of discovery.
A newly discovered and unusually sophisticated cryptojacking attack attempts to install cryptominers on both database and application servers by targeting misconfigured Redis servers, as well as Windows servers that are susceptible to the EternalBlue NSA exploit.
Researchers have discovered a new malware that steals cryptocurrency and other electronic funds by surreptitiously modifying wallet or payment information whenever victims copy it to their devices' clipboards.
Illegal cryptocurrency mining has taken over as the primary money-generating methodology for many cybercriminals, but even companies attempting to mine digital currency legally are running into some problems.
A new ransomware attack called Thanatos demands payment in Bitcoin Cash, which contains a decryption bug that makes it impossible for attack victims to recover stolen files, reports security researcher Malware HunterTeam.
The Rig exploit kit, once used almost exclusively to deliver ransomware, is now not only not delivering that ransomware but has seen a 96 percent reduction in overall usage.
Malicious actors can abuse Microsoft Word's Online Video feature to deliver videos that secretly exhaust their viewers' computer processing power in order to mine cryptocurrencies, according to Israeli cybersecurity firm Votiro.