Who and What Is Coinhive?

Credit to Author: BrianKrebs| Date: Mon, 26 Mar 2018 12:12:31 +0000

Multiple security firms recently identified cryptocurrency mining service Coinhive as the top malicious threat to Web users, thanks to the tendency for Coinhive’s computer code to be used on hacked Web sites to steal the processing power of its visitors’ devices. This post looks at how Coinhive vaulted to the top of the threat list less than a year after its debut, and explores clues about the possible identities of the individuals behind the service.

Read more

MIRUS – a cryptomining virus

Credit to Author: Preksha Saxena| Date: Tue, 27 Feb 2018 09:59:54 +0000

Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have analyzed a virus that infects user files with mining scripts. CoinHive is…

Read more

The state of malicious cryptomining

Credit to Author: Jérôme Segura| Date: Mon, 26 Feb 2018 16:08:03 +0000

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.

Categories:

Tags:

(Read more…)

The post The state of malicious cryptomining appeared first on Malwarebytes Labs.

Read more

Deepfakes FakeApp tool (briefly) includes cryptominer

Credit to Author: Christopher Boyd| Date: Fri, 23 Feb 2018 17:20:00 +0000

We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.

Categories:

Tags:

(Read more…)

The post Deepfakes FakeApp tool (briefly) includes cryptominer appeared first on Malwarebytes Labs.

Read more

Drive-by download campaign targets Chinese websites, experiments with exploits

Credit to Author: Jérôme Segura| Date: Thu, 22 Feb 2018 16:00:00 +0000

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.

Categories:

Tags:

(Read more…)

The post Drive-by download campaign targets Chinese websites, experiments with exploits appeared first on Malwarebytes Labs.

Read more

Drive-by cryptomining campaign targets millions of Android users

Credit to Author: Jérôme Segura| Date: Mon, 12 Feb 2018 14:00:24 +0000

Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.

Categories:

Tags:

(Read more…)

The post Drive-by cryptomining campaign targets millions of Android users appeared first on Malwarebytes Labs.

Read more

Bank robbers 2.0: digital thievery and stolen cryptocoins

Credit to Author: Pieter Arntz| Date: Fri, 09 Feb 2018 19:57:07 +0000

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.

Categories:

Tags:

(Read more…)

The post Bank robbers 2.0: digital thievery and stolen cryptocoins appeared first on Malwarebytes Labs.

Read more

Cryptominers on Google Play: how Sophos protects customers

Credit to Author: Bill Brenner| Date: Thu, 01 Feb 2018 17:38:24 +0000

SophosLabs has discovered a new, worrisome dimension to the trend of attackers targeting Android mobile users for cryptocurrency mining<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/cdLYcpn6-80″ height=”1″ width=”1″ alt=””/>

Read more