article thumbnail

Google disrupts the Glupteba botnet

Security Affairs

The botnet was involved in stealing users’ credentials and data, mining cryptocurrencies abusing victims’ resources, and setting up proxies to funnel other people’s internet traffic through infected machines and routers. For example, the site dont.farm was used to sell access to compromised Google and Facebook advertising account.

article thumbnail

Highly evasive cryptocurrency miner targets macOS

Security Affairs

Researchers warn of an evasive cryptojacking malware targeting macOS which spreads through pirated applications Jamf Threat Labs researchers reported that an evasive cryptojacking malware targeting macOS was spotted spreading under the guise of the Apple-developed video editing software, Final Cut Pro.

Mining 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Journalist Detained When Returning to US

Schneier on Security

After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and emails and calls and texts, including encrypted messages on WhatsApp, Signal, and Telegram. Nothing on mine was spared. Consider everything on your phone right now. Pomeroy, meanwhile, searched my laptop.

Mining 101
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

Earlier this year, for example, the group was tied to a particularly aggressive malware campaign that exploited recent vulnerabilities in widely-used networking products, including flaws in Cisco and D-Link routers, as well as Citrix and Pulse VPN appliances. .” APT41’s activities span from the mid-2000s to the present day.

article thumbnail

blekko Explains Itself: Exclusive Video (Update: Exclusive Invite)

John Battelle's Searchblog

But then again, there are literally hundreds of thousands of such folks - the entire SEO/SEM industry, for example. And in case you are wondering what the big deal is, besides all the data you can mine, to my mind, it's the ability to cull the web - to "slash" the stuff you don't care about out of your search results.

Mining 86
article thumbnail

Acuity Who? Attempts and Failures to Attribute 437GB of Breached Data

Troy Hunt

Does that mean that Netflix, for example, provided customer data to this list? Slightly different column count to mine (and similar but different to the hacker forum post), and slightly different email count, but the similarities remain striking. And it's called Acuity!

Insurance 121
article thumbnail

Neeva Combines AI and Search – Now Comes The Hard Part

John Battelle's Searchblog

The iPhone in 2007 is one example – a huge market was already using cell phones, but long-simmering improvements in chip technology and internet services combined with new consumer behaviors (remember the iPod?) So did it succeed this time? Well…it certainly didn’t fail.

Marketing 138