article thumbnail

CrowdStrike discovered the first-ever Dero cryptocurrency mining campaign

Security Affairs

CrowdStrike researchers discovered the first-ever cryptocurrency mining campaign aimed at Dero mining since February 2023. It claims to offer improved privacy, anonymity and higher monetary rewards compared to other cryptocurrencies. The campaign started in February 2023 and originated from three servers based in the U.S.

Mining 74
article thumbnail

Privacy for Tigers

Schneier on Security

Wildlife crime syndicates can not only coordinate better but can mine growing public data sets, often of geotagged images. Privacy matters for tigers, for snow leopards, for elephants and rhinos ­ and even for tortoises and sharks. Video here.

Privacy 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy and Security of Data at Universities

Schneier on Security

Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII. Commercial entities are besieging universities with requests for access to data or for partnerships to mine them.

Privacy 83
article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Unfortunately, however, the BBC reports that there are a few “teething troubles […] with some users saying their privacy has been compromised after responding to an on-screen prompt asking for access to their photo library. Wait a moment – cryptocurrency mining ? What’s that? An average victim machine could “generate about $0.25

Mining 66
article thumbnail

Cryptocurrencies and cybercrime: A critical intermingling

Security Affairs

Indeed, while anonymity provides privacy and security for transactions, it can also be exploited by criminals for illicit activities, such as money laundering , drug trafficking, illegal arms sales, and terrorist financing. He is also the author of the book “La Gestione della Cyber Security nella Pubblica Amministrazione”.

article thumbnail

MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

The Last Watchdog

This variant of Xbash is equipped to quietly uninstall any one of five popular types of cloud security protection and monitoring products used on such servers. The end game for this particular hacking ring is to install crypto currency mining routines on compromised Linux servers. Targeting one device.

Privacy 196
article thumbnail

The latest variant of the RapperBot botnet adds cryptojacking capabilities

Security Affairs

Initially, they deployed and executed a separate Monero miner alongside the usual RapperBot binary, but starting from January 2023, they included the mining capabilities in the bot. The malware decodes the mining pools and Monero wallet addresses and updates the configuration before starting the embedded miner.

Mining 96