article thumbnail

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

The Last Watchdog

Related: Why cryptojacking is more insidious than ransomware. On the face, the damage caused by cryptojacking may appear to be mostly limited to consumers and website publishers who are getting their computing resources diverted to mining fresh units of Monero, Ethereum and Bytecoin on behalf of leeching attackers.

Mining 126
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Since the beginning of the year, security firms observed a new intense ransomware campaign spreading the Shade ransomware. Between January and February, a new, intense, ransomware campaign has been observed by many security firms. Trend of malicious JavaScript downloading Shade ransomware (source: ESET). Conclusions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Unfortunately, however, the BBC reports that there are a few “teething troubles […] with some users saying their privacy has been compromised after responding to an on-screen prompt asking for access to their photo library. The app then still […] accesses the photo library whether the user denies access or not.”. What’s that?

Mining 66
article thumbnail

Q&A: Here’s why Android users must remain vigilant about malicious apps, more so than ever

The Last Watchdog

The adware applications were linked together by the use of third-party Android libraries, which bypass the background service restrictions present in newer Android versions. However, our analysts were able to detect it because apps using these libraries waste the user’s battery and make the device slower.

Libraries 126
article thumbnail

Weekly podcast: Browsealoud cryptojacking, Bee Token phishing and Olympic attacks

IT Governance

This week, we discuss the use of cryptocurrency mining software on numerous government websites, a phishing scam that robbed Bee Token investors of $1 million and cyber attacks on the Pyeongchang Winter Olympics. I mentioned cyber criminals’ increasing use of cryptocurrency mining or ‘cryptomining’ software a couple of weeks ago.

article thumbnail

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

In March 2018, the city of Atlanta fell victim to a ransomware attack that shut down its computer network. This makes government networks even more vulnerable and hackers see them as a gold mine. City agencies were unable to collect payment. Police departments had to handwrite reports. Years of data disappeared.

article thumbnail

Security Affairs newsletter Round 228

Security Affairs

At least 23 Texas local governments targeted by coordinated ransomware attacks. A backdoor mechanism found in tens of Ruby libraries. Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency. Once again thank you! Bluetana App allows detecting Bluetooth card skimmers in just 3 seconds.