cryptomining
Emulating the Surging Hadooken Malware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...

RedTail Malware Abuses Palo Alto Flaw in Latest Cryptomining Campaign
The group behind the RedTail malware is exploiting a new vulnerability in Palo Alto Network's PAN-OS software to run a sophisticated cryptomining campaign that is likely backed by North Korea ...

Cryptomining Attacks: The Stealth Threat to Your Cloud Security
For threat actors targeting cloud environments, cryptomining is a favored way to make money to fuel cybercriminal activity ...

A fan-made Mario game says ‘Lets-a-cryptomine’
The world’s most iconic plumber has been spotted as the subject of a fan-made video game that’s widely available for download across the internet—but keep reading before you go to download it. ...

Norton 360 Cryptominer, Fake QR Codes on Parking Meters, Facebook Account Deactivation
Norton 360, a popular antivirus product, has installed a cryptocurrency mining program on its customers’ computers, some cities in Texas have been hit with a phishing scam designed to get users to ...

500M Avira Antivirus Users Introduced to Cryptomining
Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency. But Norton 360 isn't alone ...
2021 in Review, Part 2: 5 Top Cybersecurity Stories
Ransomware may have dominated headlines in 2021, but it’s only one of many threats security teams must protect against. We’re taking a look back at 5 top cybersecurity stories of 2021 that ...
A week in security (June 28 – June 4)
A roundup of all the most interesting cybersecurity news stories, articles, and happenings of the previous seven days. Categories: A week in security Tags: a week in securityawiscryptominingfraudstergaminghackersmalwarephishingrevilroundup (Read more...) The post ...

Crypto Threats Surge by 500%, and It’s All About the Money
Previously reserved for early adopters and tech-savvy consumers, cryptocurrencies have gone mainstream -- with tech entrepreneurs and prominent financial institutions leading the charge ...

Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities
Recently, the Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange ...