article thumbnail

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency

Security Affairs

The Ukrainian Secret Service is investigating the case of employees at a nuclear power plant that connected its system online to mine cryp tocurrency. On July 10, agents of the SBU raided the nuclear power plant and discovered the equipment used by the employees to mining cryptocurrency. ” reported ZDnet. Pierluigi Paganini.

Mining 97
article thumbnail

Cryptojacking Coinhive Miners for the first time found on the Microsoft Store

Security Affairs

The removed apps are Fast-search Lite, Battery Optimizer (Tutorials), VPN Browsers+, Downloader for YouTube Videos, Clean Master+ (Tutorials), FastTube, Findoo Browser 2019, and Findoo Mobile & Desktop Search. The mining script then gets activated and begins using the majority of the computer’s CPU cycles to mine Monero for the operators.”

Mining 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NewCo New York 2014: My Chairman’s Picks To Visit

John Battelle's Searchblog

The post NewCo New York 2014: My Chairman’s Picks To Visit appeared first on John Battelle's Search Blog. Both are run by great colleagues of mine – so I already know a lot about their businesses. The post NewCo New York 2014: My Chairman’s Picks To Visit appeared first on John Battelle's Search Blog.

article thumbnail

BlackSquid malware uses multiple exploits to drop cryptocurrency miners

Security Affairs

The list of exploits used by the malware includes EternalBlue , DoublePulsar ; exploits for CVE-2014-6287, Tomcat arbitrary file upload vulnerability CVE-2017-12615 , CVE-2017-8464 ; and three ThinkPHP exploits for different versions of the framework. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Mining 63
article thumbnail

Cranes, drills and other industrial machines exposed to hack by RF protocols

Security Affairs

Machines used in transportation, manufacturing, construction, and mining sectors often use radio frequency (RF) protocols. Below two PoC videos published by Trend Micro experts. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini. SecurityAffairs – RF protocols, hacking).

article thumbnail

Expert released PoC for Outlook for Android flaw addressed by Microsoft

Security Affairs

This one is mine. ” Below the timeline of the flaw: 10 December 2018 – First disclosed to MSRC 16 January 2019 – Video screen capture of vulnerability sent. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Mining 66
article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

not located behind routers or firewalls) to conduct future DDoS attacks on data centers and cloud services or for crypto currency mining purposes. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. About the author: Matt Burke.

IoT 89