coinhive

IndependentKrebs

Who and What Is Coinhive?

Credit to Author: BrianKrebs| Date: Mon, 26 Mar 2018 12:12:31 +0000

Multiple security firms recently identified cryptocurrency mining service Coinhive as the top malicious threat to Web users, thanks to the tendency for Coinhive’s computer code to be used on hacked Web sites to steal the processing power of its visitors’ devices. This post looks at how Coinhive vaulted to the top of the threat list less than a year after its debut, and explores clues about the possible identities of the individuals behind the service.

Read More
QuickHealSecurity

MIRUS – a cryptomining virus

Credit to Author: Preksha Saxena| Date: Tue, 27 Feb 2018 09:59:54 +0000

Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have analyzed a virus that infects user files with mining scripts. CoinHive is…

Read More
MalwareBytesSecurity

The state of malicious cryptomining

Credit to Author: Jérôme Segura| Date: Mon, 26 Feb 2018 16:08:03 +0000

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.

Categories:

Tags:

(Read more…)

The post The state of malicious cryptomining appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Deepfakes FakeApp tool (briefly) includes cryptominer

Credit to Author: Christopher Boyd| Date: Fri, 23 Feb 2018 17:20:00 +0000

We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.

Categories:

Tags:

(Read more…)

The post Deepfakes FakeApp tool (briefly) includes cryptominer appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Drive-by download campaign targets Chinese websites, experiments with exploits

Credit to Author: Jérôme Segura| Date: Thu, 22 Feb 2018 16:00:00 +0000

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.

Categories:

Tags:

(Read more…)

The post Drive-by download campaign targets Chinese websites, experiments with exploits appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Drive-by cryptomining campaign targets millions of Android users

Credit to Author: Jérôme Segura| Date: Mon, 12 Feb 2018 14:00:24 +0000

Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.

Categories:

Tags:

(Read more…)

The post Drive-by cryptomining campaign targets millions of Android users appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Bank robbers 2.0: digital thievery and stolen cryptocoins

Credit to Author: Pieter Arntz| Date: Fri, 09 Feb 2018 19:57:07 +0000

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.

Categories:

Tags:

(Read more…)

The post Bank robbers 2.0: digital thievery and stolen cryptocoins appeared first on Malwarebytes Labs.

Read More