article thumbnail

TeamTNT is back and targets servers to run Bitcoin encryption solvers

Security Affairs

The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 and targets Docker installs. The activity of the TeamTNT group has been detailed by security firm Trend Micro, but in August 2020 experts from Cado Security discovered that botnet is also able to target misconfigured Kubernetes installations.

article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

Cyber criminals may damage, destroy, steal, encrypt, expose, or leak data as well as cause harm to a system. Cyberattacks are on the rise, with cyber criminal trends and techniques becoming increasingly sophisticated and creative. Encrypted threats spiked 167%, ransomware increased 105%, and 5.4 Ransomware. Other methods.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

Cybercriminals continue to abuse unprotected Docker APIs to create new containers used for cryptojacking, Trend Micro warns. Earlier this year Sysdig and Aqua Security researchers started observing cyber attacks targeting Kubernets and Docker instances aimed at mining Monero cryptocurrency. Docker Trusted Registry ).

Mining 88
article thumbnail

Phishing campaign targets LATAM e-commerce users with Chaes Malware

Security Affairs

bin, researchers also observed the use of a cryptocurrency mining module. . Experts observed several variants over the recent months, it authors have improved encryption and implemented new functionality of the final Node.js The malware also installs three other files, hhc.exe, hha.dll and chaes1.bin,

Phishing 122
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

As stated in a recent Eset report , the Shade infection had an increase during October 2018, keeping a constant trend until the second half of December 2018, taking a break around Christmas, and then resuming in mid-January 2019 doubled in size (shown in Figure 1). Trend of malicious JavaScript downloading Shade ransomware (source: ESET).

article thumbnail

Underminer Exploit Kit spreading Bootkits and cryptocurrency miners

Security Affairs

Malware researchers from Trend Micro have spotted a new exploit kit, tracked as Underminer exploit kit, delivering a bootkit that infects the system’s boot sectors as well as a cryptocurrency miner dubbed Hidden Mellifera. Below the infection flow of Underminer’s exploits described by Trend Micro. ” concludes Trend Micro.

article thumbnail

FTX Collapse Highlights the Cybersecurity Risks of Crypto

eSecurity Planet

One way is through hijacking computer resources to mine cryptocurrencies. Crypto can also be a way to leverage cybersecurity breaches.