Analysis of new malware samples used by the Rocke group for cryptojacking reveals code that uninstalls from Linux servers multiple cloud security and monitoring products developed by Tencent Cloud and Alibaba Cloud. Rocke’s goal is to compromise Linux machines and use them to mine for Monero cryptocurrency. They exploit several vulnerabilities in Apache Struts...Continue Reading
Cyber security researchers have just discovered a new malware, called “Linux Rabbit,” that targeted Linux servers and Internet-of-Things (IoT) devices in a campaign that began in August 2018 and continued until October 2018. The campaign targeted devices in Russia, South Korea, the UK, and the US. The campaign utilizes two strains of malware that share...Continue Reading
Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies. Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the...Continue Reading
As per cybersecurity firm Inksit Group, state-financed programmers in North Korea have been focusing on crypto trades in South Korea to go around different authorizations forced on the routine. The security firm affirmed the legislature of North Korea of running illegal introductory coin offering (ICO) extends and breaking into substantial crypto trades. “We...Continue Reading
Rakhni, an old ransomware dating as far back as the year 2013, recently stepped up its game by adding a new devastating algorithm with its arsenal of attacks. It now decides whether to demand ransomware or secretly profit by installing a miner. How It Works The malware is shared via email attachment, often disguised as...Continue Reading
A new clipboard hijacking malware has been discovered this June, specifically targeting cryptocurrency credentials on matching accounts, mainly destination addresses, most notably for Bitcoin and Etherium users. So far, it has infected an estimated 300,000 computers worldwide, with a huge percentage running on Windows. In case you were wondering how this works, cryptocurrency transfers require...Continue Reading
You might have heard of the threats that are built into machines, and the ones that are created by people to exploit loopholes in any given system. We’re all aware of the malwares and viruses, the phishing sites, fake accounts, and everything digital threat that exists in this day and age. But let’s throw it...Continue Reading
We have to be aware on how our private information and security is being handled. Crypto currency exchanges are no exception, because malicious attacks such as phishing and its kind exist, and have already found a way to exploit the technology. Aside from technology being exploited, the general public is also a key aspect for...Continue Reading
What is the new scam of the town? Cryptocurrency boom has been in effect and it has been the talk of town, a lot of businesses and individuals took advantage of the craze where some created their own cryptocurrencies to join in the hype. Of course cybercriminals also joined in the fray by using cryptocurrencies...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.