Remove 2019 Remove Analysis Remove Encryption Remove Mining
article thumbnail

Blue Mockingbird Monero-Mining campaign targets web apps

Security Affairs

Crooks exploit CVE-2019-18935 deserialization vulnerability to achieve remote code execution in Blue Mockingbird Monero-Mining campaign. This issue could be exploited only when the encryption keys are obtained via a separate attack, meaning that the attackers have to chain more exploits in their campaigns.

Mining 90
article thumbnail

MyKings botnet operators already amassed at least $24 million

Security Affairs

Avast researchers reported that since 2019, MyKings operators have amassed at least $24 million in the Bitcoin, Ethereum, and Dogecoin. ” reads the analysis published by the expert. “For protection against quick analysis and against static extraction with regular expressions, the substitute values are encrypted.

ROT 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New variant of Linux Botnet WatchBog adds BlueKeep scanner

Security Affairs

Experts at Intezer researchers have spotted a strain of the Linux mining that also scans the Internet for Windows RDP servers vulnerable to the Bluekeep. ” The vulnerability , tracked as CVE-2019-0708, impacts the Windows Remote Desktop Services (RDS) and was addressed by Microsoft with May 2019 Patch Tuesday updates. .

Mining 75
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

As stated in a recent Eset report , the Shade infection had an increase during October 2018, keeping a constant trend until the second half of December 2018, taking a break around Christmas, and then resuming in mid-January 2019 doubled in size (shown in Figure 1). Technical analysis. References to an Oil-Gas company.

article thumbnail

Phishing campaign targets LATAM e-commerce users with Chaes Malware

Security Affairs

In 2019, over 320 million users were registered with the MercadoLivre e-commerce platform. . ” reads the analysis published by Cybereason. bin, researchers also observed the use of a cryptocurrency mining module. . Chaes is written in several programming languages including Javascript, Vbscript,NET , Delphi and Node.js.

Phishing 120
article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

Ransomware accounted for over half of all malicious mailings in H1 2019, Troldesh aka Shade being the most popular tool among cybercriminals. The first half of 2019 saw a 10-fold increase in the number of password-protected objects, such as documents and archive files, being used to deliver malware. Financial departments at high risk.

article thumbnail

Ransomware, Trojan and Miner together against “PIK-Group”

Security Affairs

For example, after encryption, the file “1.jpg” Nheqminer is a great implementation of equihash mining, mainly used on NiceHas but forked many times and todays is getting used for several spare projects as well. According to zcashnetwork the attacker’s wallet received from mining activity 4.89 crypted000007” extension to each.