cryptocurrency
Attackers disrupt business operations through stealthy crypto mining
WannaMine, a Monero-mining worm discovered last October, is increasingly wreaking havoc on corporate computers. Either by slowing down computers or by crashing systems and …
British cryptocurrency traders robbed of Bitcoin at gunpoint
Cryptocurrency heists are usually covert affairs that leave users with empty wallets, but not fearing for their life. Still, there are always some unlucky individuals who get …
Old Bitcoin transactions can come back to haunt you
A group of researchers from Qatar University and Hamad Bin Khalifa University have demonstrated how years-old Bitcoin transactions can be used to retroactively deanonymize …
Rise in cryptomining malware impacts organizations worldwide
Cybercriminals are increasingly turning to cryptominers to develop illegal revenue streams, while ransomware and malvertising adware continue to impact organizations …
ICO protection: Key threats, attack tools and safeguards
Group-IB has analyzed the basic information security risks for the cryptoindustry and compiled a rating of key threats to an ICO (initial coin offering). On average, over 100 …
Fake cryptocurrency wallet carries ransomware, leads to spyware
People around the world are rushing to acquire all kinds of cryptocurrency, hoping that prices will go up and they will be rolling in money when they sell their investment …
Satori variant hacks into mining rigs, steals ETH by replacing wallet address
Qihoo 360 Netlab researchers warn about a new variant of the Satori malware that apparently goes after ether (ETH) mining rigs. The malware The malware, dubbed …
RIG EK covertly delivers cryptocurrency miners
Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. …
Hardware wallet security is no match for scammers’ ingenuity
It is often noted that hardware cryptocurrency wallets are one of the better options for keeping one’s private keys safe: they are not affected by malware, the private …
How to make public Wi-Fi users mine cryptocurrency for you
Covertly roping unsuspecting users’ machines into mining cryptocurrency is a dream for many aspiring cryptocurrency owners, and some of them set aside ethical …
PyCryptoMiner ropes Linux machines into Monero-mining botnet
A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a …
How to keep your browser and devices safe from cryptojackers
Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …
Featured news
Sponsored
Don't miss
- Three hard truths hindering cloud-native detection and response
- Spotting AI-generated scams: Red flags to watch for
- Whitepaper: Reach higher in your career with cloud security
- Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519)
- Enhancing firewall management with automation tools