article thumbnail

Weekly Update 94

Troy Hunt

I'll prepare some great demos over the next few days to illustrate the problems which just seem to be going over the heads of many people. Many blocked sites were redirected to affiliate ads and cryptocurrency mining scripts. Don't think I've seen someone store both a password hash *and* the plain text of it in a data breach!

Mining 46
article thumbnail

Knock-Knock Docker!! Will you let me in? Open API Abuse in Docker Containers

Security Affairs

I have created a demo set-up to demonstrate a few of these examples. A few of the hosts are running with multiple mining containers; moreover, the containers are dynamic in nature hence the data varies a bit everytime we scan the open APIs. Password – phantompain. Pool Used – pool.aeon.hashvault.pro:3333.

Mining 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

Blog post with links: [link] [Live Demo] Ridiculously Easy Security Awareness Training and Phishing Old-school awareness training does not hack it anymore. Whatever the scenario, keep in mind that such things will never compel you to give away OTPs, PINs, or passwords. KnowBe4 Mobile Learner App - Users can now train anytime, anywhere!

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

They do like crypto mining and containers and stuff. So seems relatively benign, but one thing a lot of people don't realize is that they have a detection for crypto mining and they'll just destroy the system. But one thing this group does with their core team TNT, by the way, is they actually still have some Cloud credentials.

Cloud 40
article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

anyone tries to reach out to either demo or us about the scans then we'll be happy to answer all the questions and also excluding IP addresses. So perhaps Bitcoin mining Well, cryptocurrency mining was in their mind. Léveillé: So in the case of Kobalos, there was a password that was required to authenticate.