Cryptocurrency: A cryptocurrency is an encrypted data string that denotes a unit of currency. It is monitored and organized by a peer-to-peer network called a blockchain, which also serves as a secure ledger of transactions, Leer más
- 29 de marzo de 2022Our research into cloud-based cryptocurrency mining sheds light on the malicious actor groups involved in this space, their ongoing battle for cloud resources, and the actual extent of the impact of their attacks.
- 20 de julio de 2021Our research sheds light on the tools and techniques used by TeamTNT and the potential impact of the group’s sundry malicious activities.
- 19 de agosto de 2020In our monitoring of Docker-related threats, we came across a threat actor who uploaded malicious images to Docker Hub for cryptocurrency mining.
Cryptocurrency Miner Uses Hacking Tool Haiduc and App Hider Xhide to Brute Force Machines and Servers09 de enero de 2020The cryptocurrency-miner, a multi-component threat comprised of different Perl and Bash scripts, miner binaries, the application hider Xhide, and a scanner tool, propagates by scanning vulnerable machines and brute-forcing (primarily default) credentials.
- 28 de octubre de 2019A look into cryptocurrencies' state and how cybercriminals abuse miner malware to profit at the expense of legitimate businesses, how to find signs of infection, and recommendations to defend systems from its abuse.
- 22 de octubre de 2019A security company found cryptocurrency miner malware running undetected in more than half of the workstations in a European international airport.
- 16 de octubre de 2019The Winnti group has been reported to be using a previously undocumented backdoor named PortReuse presumably as a jump-off point from where the threat actors can launch supply chain attacks.
September Malicious Cryptocurrency-Mining Attacks Showcase Current Malware Techniques and Capabilities08 de octubre de 2019A spate of cryptocurrency-mining malware that affected Windows systems, Linux machines, and routers have been identified last September . The malware variants employed a variety of methods to hide and spread their malicious mining activities.
Threat Landscape in the Americas: How Managed Detection and Response Helps Address Persistent Threats07 de marzo de 2019We look at the most pervasive information stealers, ransomware, and cryptocurrency-mining malware in the Americas in 2018 and how they highlight the significance of proactive threat detection and incident response capabilities.