Lemon_Duck PowerShell malware cryptojacks enterprise networks

Credit to Author: rajeshnataraj| Date: Tue, 01 Oct 2019 04:01:09 +0000

SophosLabs are monitoring a significant spike in crypto mining attacks, which spread quickly across enterprise networks. Starting from a single infection, these attacks use a variety of malicious scripts that, eventually, turn an enterprise&#8217;s large pool of CPU resources into efficient cryptocurrency mining slaves. The threat actors behind these campaigns have been using an array [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jF91Bgk0dso” height=”1″ width=”1″ alt=””/>

Read more

Cryptojacking in the post-Coinhive era

Credit to Author: Jérôme Segura| Date: Thu, 02 May 2019 15:00:00 +0000

Cryptojacking captured everyone’s attention in 2017 and 2018. With Coinhive no longer in business, has this threat been completely snuffed out?

Categories:

Tags:

(Read more…)

The post Cryptojacking in the post-Coinhive era appeared first on Malwarebytes Labs.

Read more

Miners snatching open source tools to strengthen their malevolent power!

Credit to Author: Anant Pulgam| Date: Fri, 26 Apr 2019 07:02:51 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack vectors for cybercriminals due to its ease of deployment and instant…

Read more

Google Play and Microsoft Stores Delete Suspected Compromised Apps

Credit to Author: Trend Micro| Date: Mon, 15 Apr 2019 12:00:24 +0000

Recently, Google Play Store and Microsoft Store both deleted multiple applications from their online stores, because the apps were malicious. Google deleted a total of 29 beauty camera apps from its Play Store, most of which show users pornographic contents or send them to phishing websites. The malicious beauty camera apps, discovered by Trend Micro, looked legitimate, but…

The post Google Play and Microsoft Stores Delete Suspected Compromised Apps appeared first on .

Read more

Quick Heal Threat Report – Cryptojacking rising but Ransomware still #1 threat for consumers

Credit to Author: Sushmita Kalashikar| Date: Fri, 22 Feb 2019 13:05:25 +0000

In wake of the growing incidences of targeted cyber-attacks on enterprises using Cryptojacking, due to its ease of deployment and instant return on investments; it rather comes as a surprise that malware authors are still counting on Ransomware for targeting consumers and home users. Yes, you heard it right! According…

Read more