article thumbnail

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency

Security Affairs

The Ukrainian Secret Service is investigating the case of employees at a nuclear power plant that connected its system online to mine cryp tocurrency. On July 10, agents of the SBU raided the nuclear power plant and discovered the equipment used by the employees to mining cryptocurrency. ” reported ZDnet. Pierluigi Paganini.

Mining 103
article thumbnail

Cryptojacking Coinhive Miners for the first time found on the Microsoft Store

Security Affairs

The removed apps are Fast-search Lite, Battery Optimizer (Tutorials), VPN Browsers+, Downloader for YouTube Videos, Clean Master+ (Tutorials), FastTube, Findoo Browser 2019, and Findoo Mobile & Desktop Search. The mining script then gets activated and begins using the majority of the computer’s CPU cycles to mine Monero for the operators.”

Mining 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BlackSquid malware uses multiple exploits to drop cryptocurrency miners

Security Affairs

. “Simultaneous with its attacks, BlackSquid also downloads and executes two XMRig cryptocurrency-mining components.! “The miner in resource is the primary miner used, but it also determines if the targeted system has a video card. continues the analysis. Pierluigi Paganini. SecurityAffairs – BlackSquid , hacking).

Mining 63
article thumbnail

Cranes, drills and other industrial machines exposed to hack by RF protocols

Security Affairs

Machines used in transportation, manufacturing, construction, and mining sectors often use radio frequency (RF) protocols. Below two PoC videos published by Trend Micro experts. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. ” reads the report. Pierluigi Paganini.

article thumbnail

Expert released PoC for Outlook for Android flaw addressed by Microsoft

Security Affairs

This one is mine. ” Below the timeline of the flaw: 10 December 2018 – First disclosed to MSRC 16 January 2019 – Video screen capture of vulnerability sent. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. link] — Bryan Appleby (@bryapp) June 22, 2019. Microsoft cannot repro.

Mining 68
article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

not located behind routers or firewalls) to conduct future DDoS attacks on data centers and cloud services or for crypto currency mining purposes. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Attacks that infect a high volume of devices with a direct internet interface (i.e., Pierluigi Paganini.

IoT 94
article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

We held over fifty stakeholder meetings between October of 2013 and April of 2015. Others, like brief and bang-bang, YouTube-style training videos, are planned. It begins with fact-finding: gathering information, learning the institution, meeting with stakeholders from various functions. The Way Forward, and a Challenge to Colleagues.