Tag: Cryptojacking
AstraLocker Shuts Down Operations, Released Free Decryptors
AstraLocker, a lesser-known ransomware group that's purported to be formed from Babuk's source code, is now shutting down operations.
Instead, the developer of AstraLocker said...
Microsoft Defender is Now Capable of Blocking Cryptojacking Operations in Windows 10
Microsoft has today announced to use Intel's CPU-based Threat Detection Technology (TDT) to detect and stop cryptojacking operations. This support is available for all...
New Cryptojacking Botnet Campaign Found Exploiting Windows and Linux Servers
A new cryptojacking campaign surfaced by researchers at various firms reveals that threat actors exploit vulnerabilities in Windows and Linux servers to mine Monero....
New Botnet Campaign Found Abusing BTC Blockchain to Hide Activities
Akamai security team has found a new campaign where botnet developers are abusing Bitcoin's blockchain transactions to hide their C2's IP addresses. The botnet...
TeamTNT Malware Upgraded to Use Open-Source Tool to Evade Detection
TeamTNT, a cryptojacking malware that targets exposed Docker APIs, has gained a new capability of hiding its malicious processes. As spotted by researchers at...
New FreakOut Malware is Found Exploiting Vulnerable Linux Software
Check Point researchers have spotted a campaign, where Linux systems with vulnerable software are being targeted with FreakOut malware. This newly discovered malware is...
Microsoft Warns of Cryptomining Attacks on Open Kubernetes Clusters
Microsoft disclosed a new range of attacks happening against Kubeflow servers and being used for cryptocurrency mining. Since high-power machines are desirable for cryptocurrency...
Blue Mockingbird Malware is Hacking Enterprise Servers For Cryptojacking
A new malware gang is exploiting a few servers to gain admin-level access. This is to use the machine for minting Monero cryptocurrency and...
Zoom Popularity Is Used By Hackers For Cryptojacking
Zoom's been the center of attraction ever since the outbreak began. It has attracted many companies which were forced to turn their model to...
Initial BlueKeep Vulnerability is Used for a Failed Cryptojacking Mission
It's expected, but not at this level. Since May this year, Microsoft has been warning users and enterprises to update their systems to avoid...