Sophisticated Cryptocurrency Mining RETADUP Worm Goes Polymorphic to Evade Detection by Security Scanners

A new variant of cryptocurrency mining RETADUP worm found shifted to AutoHotKey version an open source windows programming language that used for creating hotkeys. It allows users to automate repetitive tasks such as keyboard shortcuts, macros, and automation software. This new variant...
equihash

Hackers Fake Computational Power to Steal Cryptocurrencies Directly From Mining Pools

A new attack targeted equihash mining pools that use vulnerable equihashverifier to verify the miner's shares. The logic vulnerability in the verifier allows an attacker to fake the mining shares without using so much computing power. Probably the vulnerability may...
cryptocurrency web miner

Cryptocurrency Web Miner Makes into MSN Portal Through Advertising Platform

Cryptocurrency web miner scripts make into MSN portal through Advertising Platform AOL and create a large number of web miners. Hackers Modified the scripts of AOL advertising platform to launch a web miner program and most of the minor...
Cryptomining Trojan

Rarog Cryptomining Trojan Connecting to 161 Different Command and Control (C2) Servers & ...

Newly discovered Rarog Cryptomining Trojan Mining Monero cryptocurrency and infected around 166,000 victims around the world that keep spreading by using various methods. Rarog Trojan sold on the various underground forum since June 2017 and countless cybercriminals were used to...
Hiddenminer - Android malware

Hiddenminer – Android Monero Mining Malware Can Overheat and Cause Device Failure

A new Monero Mining Android malware dubbed ANDROIDOS_HIDDENMINER that uses the device CPU power to mine Monero malware and could cause the device to overheat and potentially fail. The Hiddenminer app posses like a legitimate Google Play update app and...

Artificial Intelligence for Security Operations

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended