INTERPOL Collaboration Reduces Cryptojacking by 78%

Credit to Author: Trend Micro| Date: Wed, 08 Jan 2020 14:40:55 +0000

Cybercriminals are often seen as having the upper hand over the “white hat” community. After all, they’re anonymous, can launch attacks from virtually anywhere in the world, and usually have the element of surprise. But there’s one secret weapon the good guys have: Collaboration. That’s why Trend Micro has always prioritized its partnerships with law…

The post INTERPOL Collaboration Reduces Cryptojacking by 78% appeared first on .

Read more

Lemon_Duck PowerShell malware cryptojacks enterprise networks

Credit to Author: rajeshnataraj| Date: Tue, 01 Oct 2019 04:01:09 +0000

SophosLabs are monitoring a significant spike in crypto mining attacks, which spread quickly across enterprise networks. Starting from a single infection, these attacks use a variety of malicious scripts that, eventually, turn an enterprise&#8217;s large pool of CPU resources into efficient cryptocurrency mining slaves. The threat actors behind these campaigns have been using an array [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jF91Bgk0dso” height=”1″ width=”1″ alt=””/>

Read more

Cryptojacking in the post-Coinhive era

Credit to Author: Jérôme Segura| Date: Thu, 02 May 2019 15:00:00 +0000

Cryptojacking captured everyone’s attention in 2017 and 2018. With Coinhive no longer in business, has this threat been completely snuffed out?

Categories:

Tags:

(Read more…)

The post Cryptojacking in the post-Coinhive era appeared first on Malwarebytes Labs.

Read more

Miners snatching open source tools to strengthen their malevolent power!

Credit to Author: Anant Pulgam| Date: Fri, 26 Apr 2019 07:02:51 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack vectors for cybercriminals due to its ease of deployment and instant…

Read more

Google Play and Microsoft Stores Delete Suspected Compromised Apps

Credit to Author: Trend Micro| Date: Mon, 15 Apr 2019 12:00:24 +0000

Recently, Google Play Store and Microsoft Store both deleted multiple applications from their online stores, because the apps were malicious. Google deleted a total of 29 beauty camera apps from its Play Store, most of which show users pornographic contents or send them to phishing websites. The malicious beauty camera apps, discovered by Trend Micro, looked legitimate, but…

The post Google Play and Microsoft Stores Delete Suspected Compromised Apps appeared first on .

Read more