article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

Norton 360 , one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. According to the FAQ posted on its site , “ Norton Crypto ” will mine Ethereum (ETH) cryptocurrency while the customer’s computer is idle.

Mining 328
article thumbnail

Blue Mockingbird Monero-Mining campaign targets web apps

Security Affairs

Crooks exploit CVE-2019-18935 deserialization vulnerability to achieve remote code execution in Blue Mockingbird Monero-Mining campaign. This issue could be exploited only when the encryption keys are obtained via a separate attack, meaning that the attackers have to chain more exploits in their campaigns. Pierluigi Paganini.

Mining 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TeamTNT is back and targets servers to run Bitcoin encryption solvers

Security Affairs

The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 and targets Docker installs. ” The Pollard’s Kangaroo interval ECDLP solver algorithm appears to be an attempt to break the SECP256K1 encryption which is used by Bitcoin to implement its public key cryptography. Pierluigi Paganini.

article thumbnail

Hardware Vulnerability in Apple’s M-Series Chips

Schneier on Security

As long as the GoFetch app and the targeted cryptography app are running on the same performance cluster—­even when on separate cores within that cluster­—GoFetch can mine enough secrets to leak a secret key. As a result, the DMP often reads the data and attempts to treat it as an address to perform memory access.

article thumbnail

Cryptocurrencies and cybercrime: A critical intermingling

Security Affairs

Emerging threats Cybercrime often exploits precisely the lack of regulation and centralized controls of cryptocurrencies to deceive investors and embezzle funds through various forms of phishing, investment scams, digital wallet theft, ransomware, and illegal mining.

article thumbnail

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

Security Affairs

Below the infection chain described by Avast: The eScan updater triggers the update The downloaded package file is replaced with a malicious one on the wire because of a missing HTTPS encryption (MitM is performed) A malicious package updll62.dlz ” reads the analysis published by Avast. ” concludes the report.

Cleanup 99
article thumbnail

8220 Gang used new ScrubCrypt crypter in recent cryptojacking attacks

Security Affairs

Fortinet researchers observed the mining group 8220 Gang using a new crypter called ScrubCrypt in cryptojacking attacks. “This payload extracts ScrubCrypt, which obfuscates and encrypts applications and makes them able to dodge security programs. .” ” reads the analysis published by Fortinet.

Mining 89