RIG exploit kit campaign gets deep into crypto craze

Credit to Author: Jérôme Segura| Date: Tue, 09 Jan 2018 17:11:16 +0000

We take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more recently via a campaign dubbed Ngay.

Categories:

Tags:

(Read more…)

The post RIG exploit kit campaign gets deep into crypto craze appeared first on Malwarebytes Labs.

Read more

Cybersecurity Predictions: What to expect in 2018

Credit to Author: Rajib Singha| Date: Tue, 26 Dec 2017 13:08:50 +0000

At the risk of being pessimistic, I’d say that 2017 wasn’t such as a great year for cybersecurity. Why? Well, where do I begin? Before we get on with the cybersecurity predictions for 2018, let’s take a quick flashback of 2017 2017 was riddled with cybersecurity mayhems: WannaCry – the…

Read more

Cybersecurity Predictions: What to expect in 2018?

Credit to Author: Rajib Singha| Date: Tue, 26 Dec 2017 13:08:50 +0000

At the risk of being pessimistic, I’d say that 2017 wasn’t such as a great year for cybersecurity. Why? Well, where do I begin? 2017 – a quick flashback 2017 was riddled with cybersecurity mayhems: WannaCry – the biggest ransomware attack in history; took down over 300,000 computers worldwide, closely…

Read more

Web-based cryptominers are malware

Credit to Author: Bill Brenner| Date: Tue, 19 Dec 2017 16:50:40 +0000

Cryptominers running in a browser without an organization’s consent are parasitic and should be considered malware<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=44653&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/LspUwUi25_k” height=”1″ width=”1″ alt=””/>

Read more

There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market

Credit to Author: Christopher Boyd| Date: Wed, 13 Dec 2017 19:53:19 +0000

The digital world of Bitcoin is ablaze with profit, speculation, and potential riches for all – unfortunately, scammers are in on the action and will stop at nothing to relieve the unwary of their digital fortunes. From the oldest tricks in the book to all new types of scams, it seems everyone is turning their attention to Bitcoin. What are the threats, and what can you do about it to stay safe?

Categories:

Tags:

(Read more…)

The post There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market appeared first on Malwarebytes Labs.

Read more

How cryptocurrency mining works: Bitcoin vs. Monero

Credit to Author: Pieter Arntz| Date: Mon, 11 Dec 2017 16:00:08 +0000

Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons.

Categories:

Tags:

(Read more…)

The post How cryptocurrency mining works: Bitcoin vs. Monero appeared first on Malwarebytes Labs.

Read more

A week in security (November 27 – December 03)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Dec 2017 18:30:33 +0000

A compilation of notable security news and blog posts from Monday, November 27 to Sunday, December 3, including smart toys, another security breach, ransomware, and things to ponder when shopping for gifts this Christmas season.

Categories:

Tags:

(Read more…)

The post A week in security (November 27 – December 03) appeared first on Malwarebytes Labs.

Read more

A week in security (November 6 – November 12)

Credit to Author: Malwarebytes Labs| Date: Mon, 13 Nov 2017 20:47:53 +0000

Learn what happened in the world of security during the week of November 6 through 12. Bitcoin multiplier scams, exploit kits, cryptocurrency mining, and a bogus WhatsApp app.

Categories:

Tags:

(Read more…)

The post A week in security (November 6 – November 12) appeared first on Malwarebytes Labs.

Read more