Cryptocurrency | SC Media

Cryptocurrency

Rocke malware disables cloud security before mining cryptocurrency

By

A new Linux cryptocurrency mining malware used by the Rocke group can evade detection from cloud security protocols by disabling them. Palo Alto’s Unit 42 researchers spotted what appears to be the first malware family that can target and remove cloud security products, according to a blog post. “Public cloud infrastructure is one of the…

Researchers claim serious vulnerabilities in hardware cryptocurrency wallets

By

Some of the most popular cryptocurrency hardware wallets were found to be vulnerable to firmware, side-channel, microcontroller and supply-chain attacks, although manufacturers are maintaining their products are secure. Researchers  Dmitry Nedospasov, Thomas Roth and Josh Datko demonstrated the vulnerabilities dubbed “wallet.fail” in a range of cryptocurrency wallets including Trezor One, Ledger Nano S, and Ledger…

Calendar

Cryptojacking, coin-mining malware, new smaller dark web marketplaces rise in 2018

A continued rise in cryptojacking and growth in coin-miner malware returned to unprecedented levels after a temporary slowdown in the second quarter of 2018 highlight the trends in McAfee Advanced Threat Research’s December report. Analyzing threats that emerged in the third quarter, the report cited two new exploit kits: Fallout and Underminer. “Fallout almost certainly…

upward graph 700px

Cybersecurity trends in 2018

By

End of the year wrap-ups always want to name a year something, like the “Year of Ransomware” or the “Year of Artificial Intelligence,” but it would be difficult to pin 2018 to a specific threat or trend, as so many reared their ugly heads. With that noted, it is pretty simple to define the year…

Land of the giants – Cybersecurity in 2018

By

2018 threw some cybersecurity curve balls but it also looked a lot like 2017…only bigger. Teri Robinson reports. Once upon a time, a Starwood breach exposed 500 million customers… $3.2 billion was lost to phishing attacks… 2.3 billion account credentials were compromised… A ransomware attack on the Sacramento Bee exposed the records of 19.5 million…

2018 Top Cyberthreats

By

It was clear it was going to be an intense year the cybersecurity industry when, just days after ringing in 2018, researchers announced a vulnerability found in essentially all CPU processors made over the previous two decades. From there, things only got busier, with news of Russian exploits, new ransomware families and much, much more.…

New Mac malware ‘DarthMiner’ joins the dark side

By

Researchers last week detected a fake Adobe piracy app that infects Mac users with a one-two combination of the EmPyre backdoor/post-exploitation agent and the XMRig cryptominer. The app pretends to be Adobe Zii, a software program that facilitates the cracking and digital piracy of Adobe products, reports Thomas Reed, director of Mac and mobile at Malwarebytes,…

Cryptomining campaign pulls new ‘Linux Rabbit’ malware out of its black hat

By

A two-month Monero cryptomining campaign targeted both Linux-based servers and Internet of Things devices with a newly discovered malware family called “Linux Rabbit,” researchers have reported. The operation occurred in two phases, each of which used a distinct version of Linux Rabbit that shares the same code base as the other iteration, according to a Dec. 6…

Midterm election hacking incidents lacking, typosquatting tops the list

By

The U.S. midterm election has passed without any disruptive cybersecurity incidents, but researchers at Bitdefender found some evidence of influence campaigns appearing and cybercriminals using election keywords for money-making scams. Bitdefender found four areas of concern. On the political side, it came across typosquatted domains registered by hackers to spread misinformation, particularly in Texas, or…

New cryptominer seeks out root permissions on Linux machines

By

Researchers at antivirus company Dr.Web have discovered a malicious Monero cryptominer specifically designed for Linux machines, with additional functionality that also allows it to operate as a backdoor. Named Linux.BtcMine.174, the trojan is described as a shell script containing over 1,000 lines of code. To receive its malicious commands from the attackers, the malware downloads and runs…

Next post in News