Remove Access Remove Encryption Remove Libraries Remove Mining
article thumbnail

Blue Mockingbird Monero-Mining campaign targets web apps

Security Affairs

Crooks exploit CVE-2019-18935 deserialization vulnerability to achieve remote code execution in Blue Mockingbird Monero-Mining campaign. This issue could be exploited only when the encryption keys are obtained via a separate attack, meaning that the attackers have to chain more exploits in their campaigns. ” concludes the report.

Mining 84
article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Guido Vranken returns to The Hacker Mind to discuss his CryptoFuzz tool on GitHub, as well as his experience fuzzing and finding vulnerabilities in cryptographic libraries and also within cryptocurrencies such as Ethereum. Nor am I going to wade into the debate about the ecological consequences of mining cryptocurrencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 228

Security Affairs

A backdoor mechanism found in tens of Ruby libraries. million to allow towns to access encrypted data. Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency. Malware Analysis Sandboxes could expose sensitive data of your organization. 5 Ways to Protect Yourself from IP Address Hacking.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. that the crooks were only able to mine a paltry $24 – which Coinhive refused to pay out anyway. Hello and welcome to the final IT Governance podcast of 2018.

article thumbnail

TeamTNT group uses Hildegard Malware to target Kubernetes Systems

Security Affairs

The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 and that targets Docker installs. The malware deploys the XMRig mining tool to mine Monero cryptocurrency. It also hides malicious processes using library injection and encrypts the malicious payload.

Mining 109
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Vamosi: To be fair, API's are also used in web applications, which you access through your web browser. The day before the general public gets access. Kent: I started calling friends of mine. I said, Do you have one of these things, and I got lucky that a friend of mine in San Francisco had one. Well, it turns out a lot.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Vamosi: To be fair, API's are also used in web applications, which you access through your web browser. The day before the general public gets access. Kent: I started calling friends of mine. I said, Do you have one of these things, and I got lucky that a friend of mine in San Francisco had one. Well, it turns out a lot.