Remove Blog Remove Mining Remove Presentation Remove Systems administration
article thumbnail

A Russian cyber vigilante is patching outdated MikroTik routers exposed online

Security Affairs

Earlier August, experts uncovered a massive crypto jacking campaign that was targeting MikroTik routers to inject a Coinhive cryptocurrency mining script in the web traffic. In September thousands of unpatched MikroTik Routers were involved in new cryptocurrency mining campaigns.

Mining 100
article thumbnail

Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices

CGI

A new and quickly spreading phenomenon is to steal computing power to mine cryptocurrencies. What is most alarming is that, in addition to advanced cyber attacks aimed at elaborate systems, criminals will use any device connected to the Internet – for example, your mobile phone or a remotely controlled heat pump. Add new comment.

Mining 74