Threat actor leverages coin miner techniques to stay under the radar – here’s how to spot them

Credit to Author: Eric Avena| Date: Mon, 30 Nov 2020 22:30:31 +0000

BISMUTH, which has been running increasingly complex cyberespionage attacks as early as 2012, deployed Monero coin miners in campaigns from July to August 2020. The group’s use of coin miners was unexpected, but it was consistent with their longtime methods of blending in.

The post Threat actor leverages coin miner techniques to stay under the radar – here’s how to spot them appeared first on Microsoft Security.

Read more

A week in security (April 27 – May 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 May 2020 15:17:37 +0000

A roundup of the previous week’s security news, including cloud data protection, Troldesh, VPNs, the cybercrime economy, and more.

Categories:

Tags:

(Read more…)

The post A week in security (April 27 – May 3) appeared first on Malwarebytes Labs.

Read more

Labs report: summer ushers in unprecedented season of breaches

Credit to Author: Malwarebytes Labs| Date: Thu, 12 Oct 2017 16:00:27 +0000

In this edition of the Malwarebytes Cybercrime Tactics and Techniques report, we saw a number of high profile breaches targeting the personal information of hundreds of millions of people. We also observed shifts in malware distribution, the revival of some old families, and found cases of international tech support scams.

Categories:

Tags:

(Read more…)

The post Labs report: summer ushers in unprecedented season of breaches appeared first on Malwarebytes Labs.

Read more