Cryptocurrency | SC Media

Cryptocurrency

Upgraded Cardinal RAT malware targets Israeli fintech firms

By

A pair of Israeli financial technology companies were recently the target of a malware campaign featuring an updated version of the rarely seen Cardinal remote access trojan, researchers from Palo Alto Networks’ Unit 42 team are reporting. And in a possibly related incident, one of the two unnamed companies was similarly attacked with EVILNUM, a…

Coinhive closes its doors

By

The popular in-browser cryptomining service Coinhive will shutter operations next week, claiming the service isn’t economically viable anymore. The Monero mining feature offered any website a “legitimate” way to generate income without relying on online advertisements or revenue by using a small piece of Javascript embedded on a webpage to leach computing power from visiting…

Ransomware out, formjacking in as primary attack vectors

By

Quick and easy attack methods like formjacking gained popularity among cybercriminals last year, while more tried and true approaches like ransomware fell to the wayside in 2018, according to a new report. The reasoning behind this switch, according to Symantec’s just-released Internet Security Threat Report, is quite straight-forward. Formjacking, which entails placing malware on a…

Monero miner combines RADMIN and MIMKATZ to spread and infect

By

A Monero miner-malware is leveraging RADMIN and MIMKATZ for propagation while exploiting critical vulnerabilities to spread in a worm-like behavior to covertly target specific systems in industries in China, Taiwan, Italy, and Hong Kong. Researchers noted an uptick in activities between the last week of January and February 2019 which coincidentally coincided with regional holiday…

‘Clipper’ malware that alters crypto wallet addresses slips into Play Store

By

Google’s Play Store unknowingly hosted a fake cryptocurrency app that actually modifies users’ crypto wallet addresses once they’re copied to the clipboard, researchers are reporting. This Android-based “clipper” malware, as it’s called, secretly changes the wallet address to one hosted by the attackers, allowing them to steal victims’ digital coin transactions, explains ESET researcher Lukas…

California SIM swapping conviction reportedly may be a legal first

By

Prosecutors in California have reportedly won what they believe to be the first-ever conviction for the act of SIM hijacking. Joel Ortiz, a 20-year-old college student from Boston, pleaded guilty in a Santa Clara County courtroom last month to stealing over $5 million in cryptocurrency after taking over the phone numbers of roughly 40 individuals…

Double jeopardy: Data center security and the threat of cryptocurrency mining

By Liviu Arsene, senior e-threat analyst, Bitdefender Cybercrime is motivated by financial gain, be it in the form of money or data that can be monetized. Experts estimate the cybercrime industry nets trillions in illicit profits while causing significant financial and reputational damage to organizations. Organizations agree that their security risks have increased in the…

Malwarebytes CEO Marcin Kleczynski

AI use in ransomware attacks and sextortion schemes top Malwarebytes 2018 report

By

The Malwarebytes State of Malware 2018 report found an odd mix of attacks that took place last year with businesses bearing the brunt of cybercriminals’ efforts, while consumers were victimized in a new way using their previously hacked PII. Malwarebytes CEO Marcin Kleczynski The amount of malware targeted at business increased 79 percent, compared to…

Rocke malware disables cloud security before mining cryptocurrency

By

A new Linux cryptocurrency mining malware used by the Rocke group can evade detection from cloud security protocols by disabling them. Palo Alto’s Unit 42 researchers spotted what appears to be the first malware family that can target and remove cloud security products, according to a blog post. “Public cloud infrastructure is one of the…

Researchers claim serious vulnerabilities in hardware cryptocurrency wallets

By

Some of the most popular cryptocurrency hardware wallets were found to be vulnerable to firmware, side-channel, microcontroller and supply-chain attacks, although manufacturers are maintaining their products are secure. Researchers  Dmitry Nedospasov, Thomas Roth and Josh Datko demonstrated the vulnerabilities dubbed “wallet.fail” in a range of cryptocurrency wallets including Trezor One, Ledger Nano S, and Ledger…

Next post in Security News