Obfuscated Coinhive shortlink reveals larger mining operation

Credit to Author: Jérôme Segura| Date: Tue, 03 Jul 2018 15:00:00 +0000

A web miner injected into compromised sites is just the tip of the iceberg for an infrastructure hosting malicious Windows and Linux coin miners.

Categories:

Tags:

(Read more…)

The post Obfuscated Coinhive shortlink reveals larger mining operation appeared first on Malwarebytes Labs.

Read more

Cryptocurrency mining rampage throttles Linux machines – an analysis by Quick Heal Security Labs

Credit to Author: Amar Patil| Date: Tue, 22 May 2018 11:44:28 +0000

Quick Heal Security Labs recently came across a Linux-based Monero (XMR) miner. Monero (XMR) is one of the top 15 cryptocurrencies. It can be mined easily on any machine using its CPU computation power. This is one of the reasons why it is preferred to Bitcoin or Ethereum which are…

Read more

Cryptocurrency mining rampage throttles Linux machines

Credit to Author: Amar Patil| Date: Tue, 22 May 2018 11:44:28 +0000

Quick Heal Security Labs recently came across a Linux-based Monero (XMR) miner. Monero (XMR) is one of the top 15 cryptocurrencies. It can be mined easily on any machine using its CPU computation power. This is one of the reasons why it is preferred to Bitcoin or Ethereum which are…

Read more

The state of malicious cryptomining

Credit to Author: Jérôme Segura| Date: Mon, 26 Feb 2018 16:08:03 +0000

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.

Categories:

Tags:

(Read more…)

The post The state of malicious cryptomining appeared first on Malwarebytes Labs.

Read more

In-browser Cryptojacking at full throttle – A report by Quick Heal Security Labs

Credit to Author: Prashant Kadam| Date: Tue, 23 Jan 2018 06:38:43 +0000

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now, web browsers are taking part in cryptomining and its activity is growing because…

Read more

RIG exploit kit campaign gets deep into crypto craze

Credit to Author: Jérôme Segura| Date: Tue, 09 Jan 2018 17:11:16 +0000

We take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more recently via a campaign dubbed Ngay.

Categories:

Tags:

(Read more…)

The post RIG exploit kit campaign gets deep into crypto craze appeared first on Malwarebytes Labs.

Read more

Web-based cryptominers are malware

Credit to Author: Bill Brenner| Date: Tue, 19 Dec 2017 16:50:40 +0000

Cryptominers running in a browser without an organization’s consent are parasitic and should be considered malware<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=44653&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/LspUwUi25_k” height=”1″ width=”1″ alt=””/>

Read more