Результатов: 753
Фото:

Meet Panda, an illicit cryptocurrency mining crew terrorizing organizations worldwide

Cybersecurity researchers have profiled a hacking crew named “Panda” believed to have amassed roughly $90,000 worth of cryptocurrency via remote access tools (RATs) and illicit mining malware. The Cisco Talos Intelligence Group noted that while Panda isn’t exactly sophisticated, it has persisted as one of the internet’s most active attackers in recent years. дальше »

2019-9-18 15:12


Фото:

Google purges 24 malware-ridden apps that were downloaded 500,000 times

Android just can’t seem to shake off its malware issues.  A new malware campaign targeting Android has been found to engage in ad fraud at least since early June 2019. The findings, disclosed by cybersecurity firm CSIS Security Group, reveal that the malware — called Joker — is designed to surreptitiously sign users up for premium service subscriptions, in addition to stealing the victim’s SMS messages, the contact list, and device information. дальше »

2019-9-10 10:46


Фото:

Nasty Glupteba malware uses Bitcoin blockchain to keep itself alive

Cybersecurity researchers have discovered a new strain of the nefarious Glupteba malware that uses the Bitcoin blockchain to ensure it remains dangerous. TrendMicro’s latest blog details the previously undocumented variant which is capable of invading systems to mine Monero cryptocurrency and steal sensitive browser data like passwords and cookies. дальше »

2019-9-4 17:09


Фото:

Surveillance campaign targeting Uyghur Muslims affected not just iOS, but Android too

The malware campaign targeting the Uyghur Muslim minority in China’s autonomous region of Xinjiang may have been more extensive than previously thought. According to a new report published by Washington, DC-based cybersecurity firm Volexity, the community has been been at the receiving end of a large-scale surveillance operation via “strategically compromised websites” and mobile devices running not just iOS, but also Android. дальше »

2019-9-3 14:31


French Cops Trick Monero Cryptomining Botnet to Self-Destruct on 850,000 Computers

The Retadup malware which had been deployed on hundreds of thousands of computers around the world to secretly mine the Monero cryptocurrency and commit other illegal acts may finally be over. According to the BBC, the backend infrastructure of the Retadup Monero cryptojacker which is estimated to have infected over 850,000 computers across the globe […] The post French Cops Trick Monero Cryptomining Botnet to Self-Destruct on 850,000 Computers appeared first on CCN Markets дальше »

2019-8-30 15:39


Фото:

Cryptojacking malware found in 11 RubyGem language repositories

Malware designed to surreptitiously infect victims’ computer systems and mine cryptocurrency on behalf of hackers has been found in 11 code libraries on programming language manager RubyGems. Hackers exploited RubyGems – a package manager for the Ruby programming language that devs use to upload and distribute new versions of software – by downloading Ruby libraries, adding the malicious code, and re-uploading them under new names Decrypt reports. дальше »

2019-8-22 10:20


Фото:

Researcher discloses second Steam zero-day exploit after being shut out of bug bounty program

A second zero-day vulnerability has been publicly disclosed in the Steam gaming client by security researcher Vasily Kravets after he said he was banned from its bug-bounty program. The revelations come two weeks after another zero-day previously disclosed by Kravets and researcher Matt Nelson was disputed by Valve, Steam’s parent company. дальше »

2019-8-22 09:52


Фото:

PSA: Update your Windows machine now to fix 29 Critical security vulnerabilities

Microsoft has patched four serious vulnerabilities that could allow a malicious actor to remotely take control of Windows computers. The four remote code execution flaws — addressed as part of the company’s monthly Patch Tuesday updates — affect all in-support versions of Windows and concern the Windows Remote Desktop Services (RDS) component, enabling attackers to take over a computer and then propagate malware to other computers without any user intervention. дальше »

2019-8-14 14:35


Фото:

Chinese cyber-espionage group is extorting money from the gaming industry

A Chinese threat actor, known to have perpetrated a series of state-sponsored espionage attacks, has been covertly staging financially motivated activities targeting the video game industry. According to cybersecurity firm FireEye, the cyber threat group — dubbed Advanced Persistent Threat 41 (APT41) — is unique in that “it leverages non-public malware typically reserved for espionage campaigns in what appears to be activity for personal gain. дальше »

2019-8-12 14:00


Фото:

Vicious malware threatens to turn search engine into crypto-mining zombie botnet

Enterprise search engine Elasticsearch is under threat of being turned into a sophisticated cryptocurrency mining botnet to be used in distributed denial of service (DDoS) attacks. Cybersecurity firm Trend Micro describes a new malware strain that launches multi-stage attacks on publicly accessible databases and servers that run old versions of Elasticsearch software. дальше »

2019-7-23 17:54


Фото:

It’s 2019 and Google still can’t keep malware out of its Android app store

Google appears to have a problem with stopping malicious apps from sneaking into the Play Store. In what appears to yet another case of malware disguised as a legitimate app, security researchers from Symantec have found a new app that advertised itself as an unofficial version of Telegram messaging app — only to push malicious websites in the background. дальше »

2019-7-16 14:40


Radware’s Cloud Workload Protection Service now includes ‘crypto-jacking’ detection

CryptoNinjas - Bitcoin, Cryptocurrency & Blockchain Asset SourceRadware, a leading provider of cybersecurity and application delivery solutions, today announced that its Cloud Workload Protection Service now identifies and mitigates coin-mining malware known as ‘crypto-jacking’ operations taking place in customers’ public cloud environments. дальше »

2019-7-16 14:31