Cryptominers on Google Play: how Sophos protects customers

Credit to Author: Bill Brenner| Date: Thu, 01 Feb 2018 17:38:24 +0000

SophosLabs has discovered a new, worrisome dimension to the trend of attackers targeting Android mobile users for cryptocurrency mining<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/cdLYcpn6-80″ height=”1″ width=”1″ alt=””/>

Read more

In-browser Cryptojacking at full throttle – A report by Quick Heal Security Labs

Credit to Author: Prashant Kadam| Date: Tue, 23 Jan 2018 06:38:43 +0000

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now, web browsers are taking part in cryptomining and its activity is growing because…

Read more

RIG exploit kit campaign gets deep into crypto craze

Credit to Author: Jérôme Segura| Date: Tue, 09 Jan 2018 17:11:16 +0000

We take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more recently via a campaign dubbed Ngay.

Categories:

Tags:

(Read more…)

The post RIG exploit kit campaign gets deep into crypto craze appeared first on Malwarebytes Labs.

Read more

Cybersecurity Predictions: What to expect in 2018

Credit to Author: Rajib Singha| Date: Tue, 26 Dec 2017 13:08:50 +0000

At the risk of being pessimistic, I’d say that 2017 wasn’t such as a great year for cybersecurity. Why? Well, where do I begin? Before we get on with the cybersecurity predictions for 2018, let’s take a quick flashback of 2017 2017 was riddled with cybersecurity mayhems: WannaCry – the…

Read more

Cybersecurity Predictions: What to expect in 2018?

Credit to Author: Rajib Singha| Date: Tue, 26 Dec 2017 13:08:50 +0000

At the risk of being pessimistic, I’d say that 2017 wasn’t such as a great year for cybersecurity. Why? Well, where do I begin? 2017 – a quick flashback 2017 was riddled with cybersecurity mayhems: WannaCry – the biggest ransomware attack in history; took down over 300,000 computers worldwide, closely…

Read more

Web-based cryptominers are malware

Credit to Author: Bill Brenner| Date: Tue, 19 Dec 2017 16:50:40 +0000

Cryptominers running in a browser without an organization’s consent are parasitic and should be considered malware<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=44653&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/LspUwUi25_k” height=”1″ width=”1″ alt=””/>

Read more

There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market

Credit to Author: Christopher Boyd| Date: Wed, 13 Dec 2017 19:53:19 +0000

The digital world of Bitcoin is ablaze with profit, speculation, and potential riches for all – unfortunately, scammers are in on the action and will stop at nothing to relieve the unwary of their digital fortunes. From the oldest tricks in the book to all new types of scams, it seems everyone is turning their attention to Bitcoin. What are the threats, and what can you do about it to stay safe?

Categories:

Tags:

(Read more…)

The post There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market appeared first on Malwarebytes Labs.

Read more

How cryptocurrency mining works: Bitcoin vs. Monero

Credit to Author: Pieter Arntz| Date: Mon, 11 Dec 2017 16:00:08 +0000

Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons.

Categories:

Tags:

(Read more…)

The post How cryptocurrency mining works: Bitcoin vs. Monero appeared first on Malwarebytes Labs.

Read more