Thursday, March 28, 2024
Home Search

cryptojacking - search results

If you're not happy with the results, please do another search
Malware Disguised as Google Translate

New Malware Campaign Disguised as Google Translate Distribute Cryptocurrency Miner

0
Cryptocurrency mining malware has been found recently in an ongoing campaign in 11 countries disguised as Google Translate and MP3 downloaders.In order to distribute...

Dark Utilities – A C2aaS Platform Leveraged By Hackers To Implant Malware

0
Dark Utilities is a new service that has been discovered recently by security researchers at Cisco Talos. In order to set up a C2...

Attackers Targeting MS-SQL Servers to Steal Bandwidth for Proxy Services

0
A number of factors have emerged over the past few years that have allowed the attackers to generate handsome revenue, including the following:-Bundles that...

Hackers Hijacked Alibaba Servers to Install Cryptominer Malware

0
Hackers have recently targeted and hacked the Alibaba Elastic Computing Service (ECS) instances. All this is being done with the motive to install crypto-miner...

Over 50,000 IPs Across Multiple Kubernetes Clusters Were Compromised by The TeamTNT Threat Actors

0
The cybersecurity researchers of Trend Micro have recently detected a new threat attack in which the Cryptojacking attack group named TeamTNT has compromised over...

Hackers Using Prometei Botnet to Exploiting Microsoft Exchange Vulnerabilities

0
Researchers from Cybereason has recently announced the discovery of a new highly-targeted botnet campaign, which uses the stealth and omnipresent Prometei botnet to target...

Thingbots to Robinhoods: 8 Weird & Wacky New Cyberthreats

0
The proliferation of digital devices might make it easier to access information than ever before, but it's also helped bad actors do some pretty...

PgMiner Botnet Attacks PostgreSQL Databases to Install a Cryptocurrency Miner

0
Unit 42 researchers at Paloalto discovered a cryptocurrency mining botnet named “PGMiner”. It is a Linux based cryptocurrency botnet that exploits a disputed PostgreSQL...

Hackers Abusing Docker Hub Account to Mine Monero Cryptocurrency

0
Researchers observed a malicious Docker Hub account, "azurenql" that was active since October 2019 hosting malicious images to mine cryptocurrency, Monero.According to wallet IDs,...

Lucifer – New Self-Propagating Malware Exploit Multiple Critical Bugs to Infect Windows Devices

0
Recently, the security experts have discovered a new self-propagating cryptojacking and DDoS-based malware "Lucifer" that are exploiting critical vulnerability to infect Windows devices. This vulnerability...

Managed WAF protection

Website

Recent Articles