Cryptocurrency hack

Oracle Weblogic Exploit to Deploy Monero Miner

Oracle WebLogic application server is vulnerable to cryptocurrency mining.The security researcher has found this exploit to mine monero coins in the…

7 years ago

PyCryptoMiner – A New Linux Crypto-miner Botnet Spreading over the SSH Protocol to Mining Monero

Highly Sophisticated Python Script Based Linux Crypto-miner botnet called PyCryptoMiner abusing SSH port and targeting Linux users to mining Monero CryptoCurrency.…

7 years ago

Chrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge

Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their…

7 years ago

A Group Behind the VenusLocker Ransomware Switch into Secretly Mining Monero Cryptocurrency

A new malware attack distributing to mine Monero cryptocurrency by the group Behind the VenusLocker Ransomware. VenusLocker Ransomware discovered in…

7 years ago

Largest Crypto-Mining Market Hacked – Hackers may be Stolen $68M

Bitcoin recent rise happened as fast as possible, and it crosses the $14,000 landmark for the first time in history.In…

7 years ago

Hidden Cryptocurrency Miner Coinhive’s Rapid Growth and it’s Prevention Techniques

It is very usual these days to find many applications having a hidden crypto-mining module. But the recent trend is…

7 years ago

Estonia Blocked 760,000 National Electronic ID cards due to Critical Crypto Vulnerability Detected in ID Chip

The Republic of Estonia Decides to Cancel 50,000 ID cards issued starting from October 2014 due to potential Crypto vulnerability…

7 years ago

Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID

A newly discovered Trojan called "CryptoShuffler" stole around $140,000 from cryptocurrency wallets by replacing the Original Wallet address with another…

7 years ago

Dangerous Crypto Currency Mining Malware Apps Found on Google Play Store

New Dangerous Crypto Currency Mining  Malware Apps Discovered form Google Play store that is used for Mining Crypto currency using…

7 years ago

DUHK Attack allows Hackers to Recover Encryption Keys and Decrypt Communications Passing Over VPN

DUHK attack targets the old vulnerability that resides in the pseudorandom number generator called ANSI X9.31. It is an algorithm…

7 years ago