Crypto Mining Service Coinhive to Call it Quits

Krebs on Security

com , a cryptocurrency mining service that has been heavily abused to force hacked Web sites to mine virtual currency. Trouble was, killing the key did nothing to stop Coinhive’s code from continuing to mine Monero on a hacked site.

Mining 269

Ngrok Mining Botnet

Security Affairs

Specifically, it demonstrates a novel, dynamic and robust operational security model and the ability to detect and attack newly deployed and misconfigured infrastructure. Firstly nearly all attacks observed were Crypto-mining attackers. Security Affairs – Ngrok, malware ).

Mining 114

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Government Websites Deliver Cryptocurrency Mining Code

Data Breach Today

Security of Code Pushed by Content Delivery Networks Remains Ongoing Concern More than 4,200 websites, some belonging to the U.S., and Australian governments, have been turning their visitors' computers into mining machines to harvest the virtual currency Monero.

Mining 173

Hospital Hit With Cryptocurrency Mining Malware

Data Breach Today

Do healthcare entities face a growing risk of being hit with cryptocurrency mining attacks, which have become more common in other sectors? A Tennessee hospital may be the first victim in the sector, and some security experts predict many more such incidents

Mining 173

Hacked MicroTik Routers Serve Cryptocurrency-Mining Malware

Data Breach Today

Researchers: Attackers Have Compromised More Than 209,000 Routers Attackers have targeted a patched vulnerability to exploit more than 209,000 carrier-grade routers made by Latvian manufacturer MicroTik and infect them with two types of malware - Coinhive and Crypto-Loot - designed to mine for cryptocurrency, security researchers say.

Mining 151

Pacha Group declares war to rival crypto mining hacking groups

Security Affairs

Two hacking groups associated with large-scale crypto mining campaigns, Pacha Group and Rocke Group , wage war to compromise as much as possible cloud-based infrastructure. org is in this blacklist and it is known that Rocke Group has used this domain for their crypto-mining operations.

Court Rules in Favor of Mining LinkedIn User Data

Adam Levin

A federal appellate court ruled that mining and aggregating user data publicly posted to social media sites is allowable by law. The post Court Rules in Favor of Mining LinkedIn User Data appeared first on Adam Levin. Data Security Privacy featured linkedin data mining

Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency

Security Affairs

The Ukrainian Secret Service is investigating the case of employees at a nuclear power plant that connected its system online to mine cryp tocurrency. The security incident has happened in July at the South Ukraine Nuclear Power Plant at Yuzhnoukrainsk, in the south of the country.

Mining 114

Cryptojacking: Hackers Mining Bitcoin on Your Dime!

InfoGoTo

When cryptojacking, criminal hackers use enterprise computers to mine cryptocurrencies like bitcoin without the organization’s knowledge or consent, escaping the upfront costs of buying computers or computer processing power for the job. Illicit cryptominers seize a computer’s or device’s processor to mine the cryptocurrency. On mobile devices and any computers, block all installs that the internal information technology or security team does not initiate.

Cryptocurrency Mining Employees Expose Nuclear Plant to Internet

WIRED Threat Level

Xbox eavesdropping, email scammers, and more of the week's top security news. Security Security / Security News

Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers

The Last Watchdog

Illicit crypto mining is advancing apace. It began when threat actors began stealthily embedding crypto mining functionality into the web browsers of unwitting individuals. Related article: Illicit crypto mining hits cloud services. Cybercriminals have shifted their focus to burrowing onto company servers and then redirecting those corporate computing resources to crypto mining chores. It’s likely IT and security teams won’t find the infection for months.

Mining 174

Israel surveillance firm NSO group can mine data from major social media

Security Affairs

The Israeli surveillance firm NSO Group informed its clients that it is able to scoop user data by mining from major social media. The Financial Times reported that the Israeli surveillance firm NSO Group informed its clients that it is able to mine user data from major social media.

Mining 106

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

The Last Watchdog

On the face, the damage caused by cryptojacking may appear to be mostly limited to consumers and website publishers who are getting their computing resources diverted to mining fresh units of Monero, Ethereum and Bytecoin on behalf of leeching attackers. You can mine them, if you have a powerful CPU. Or you can hijack other people’s computers to do the mining. LW: I can’t really use my MacBook to mine Bitcoin, can I?

Mining 144

MY TAKE: Knowing these 5 concepts will protect you from illicit cryptocurrency mining

The Last Watchdog

The cryptocurrency craze rages on, and one unintended consequence is the dramatic rise of illicit cryptocurrency mining. So, quite naturally, malicious hackers are busying themselves inventing clever ways to leech computing power from unwitting victims — and directing these stolen computing cycles towards lining their pockets with freshly mined crypto cash. So naturally, cryptocurrency mining services have cropped up.

Mining 121

Hackers Hijacked Tesla's Cloud to Mine Cryptocurrency

WIRED Threat Level

SecurityThe recent rash of cryptojacking attacks has hit a Tesla database that contained potentially sensitive information.

Happy Data Privacy Day: City Planning Now Mines Everyone’s Data All the Time

Adam Levin

The post Happy Data Privacy Day: City Planning Now Mines Everyone’s Data All the Time appeared first on Adam Levin. Data Security Privacy featured google data privacy day sidewalk labs

Mining 106

CoinHive Cryptocurrency Mining Service will shut down on March 8, 2019

Security Affairs

The popular in-browser cryptocurrency mining service Coinhive has announced that it will shut down on March 8, 2019. Security firms spotted several hacking campaigns aimed at compromising websites to install JavaScript-based Monero (XMR) cryptocurrency mining scripts and monetize their efforts. When unaware users visit compromised websites, the script starts using their computers’ processing power to mine cryptocurrency.

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

In an ideal world, all of the security controls are applied and all of the debugging tools are removed or disabled before the code is released to the public. As long as the adb tools is being used in a secured environment, it presents little risk.

Using Fuzzing to Mine for Zero-Days

Threatpost

Infosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in today's security landscape. InfoSec Insider ai artificial intelligence fuzzing vulnerabilities zero day

Group-IB: The Shadow Market Is Flooded with Cheap Mining Software

Security Affairs

Group-IB is recording new outbreaks of illegal mining (cryptojacking) threats in the networks of commercial and state organizations. One cryptocoin after another: what are the dangers of mining?

Here’s why LinkedIn is a ‘gold mine’ for foreign spies digging for corporate and government secrets via CNBC

IG Guru

The post Here’s why LinkedIn is a ‘gold mine’ for foreign spies digging for corporate and government secrets via CNBC appeared first on IG GURU. AI Business IG News Information Governance information privacy information security Privacy Risk News CNBC Espionage LinkedIn

Crypto-Mining Attacks Emerge as the New Big Threat to Enterprises

Dark Reading

Attackers looking to hijack systems for illegally mining digital currencies have begun eyeing business systems, security vendors say

Coinhive to Mine Its Last Monero in March

Threatpost

Cryptography Malware Web Security CoinHive cryptojacking cryptomining currency value fork hash rate Monero profitability shutting downThe controversial cryptomining service is shutting down.

Russian Developer Snuck Cryptocurrency Mining into Android Apps

Dark Reading

Apps found in Google Play turned mobile devices into cryptocurrency miners unbeknownst to their users, according to researchers from security firm Ixia

Your Garage Opener Is More Secure Than Industrial Remotes

Data Breach Today

Trend Micro Says It Moved Cranes Using RF Software Flaws Radio controllers used in the construction, mining and shipping industries are dangerously vulnerable to hackers, Trend Micro says in a new report.

Mining 236

Smominru Cryptominer Scrapes Credentials for Half-Million Machines

Threatpost

The adversaries have retooled with EternalBlue and credential theft to add a new "access mining" revenue stream. Hacks Malware Vulnerabilities Web Security access mining Carbon Black cryptomining Dark Web EternalBlue RAT selling access Smominru

Mining 100

New Monero Crypto Mining Botnet Leverages Android Debugging Tool

Threatpost

Malware Mobile Security 360 Netlab Android botnet cyyptocurrency Mirai MoneroThe botnet uses port scanning code from Mirai, a first for Android-related attacks, according to researchers.

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

After all, why lock users’ machines and demand a ransom that they might not even pay when you can just infect their machine with software that mines for cryptocurrency without their knowledge? Wait a moment – cryptocurrency mining ? Let’s just say mining entails solving complex mathematical calculations for a cryptocurrency reward and it requires a lot of processing power because it’s complicated. Cyber Security Other Blogs Podcast

Why Election Trust is Dwindling in a Post-Cambridge Analytica World

Threatpost

Featured Privacy Web Security cambridge analytica dark net Dark Web Data Data Mining Data security election security infosecurity Europe political Tor Browser

Crypto Miners May Be the ‘New Payload of Choice’ for Attackers

Threatpost

Crypto mining botnets provide a stealthy way to generate big bucks, without the downsides of ransomware. Malware Web Security Botnets Cisco Talos Cryptocurrency malware mining Monero ransomware

Other 3,700 MikroTik Routers compromised in cryptoJacking campaigns

Security Affairs

Thousands of unpatched MikroTik Routers are involved in new cryptocurrency mining campaigns. Thousands of unpatched devices are mining for cryptocurrency at the moment. The post Other 3,700 MikroTik Routers compromised in cryptoJacking campaigns appeared first on Security Affairs.

New Linux coin miner kills competing malware to maximize profits

Security Affairs

Security experts from Trend Micro have discovered a new strain of coin miner that targets the Linux platform and installs the XMR-Stak Cryptonight cryptocurrency miner. The post New Linux coin miner kills competing malware to maximize profits appeared first on Security Affairs.

Newsmaker Interview: Troy Mursch on Why Cryptojacking Isn’t Going Away

Threatpost

Criminals have found a mischievous way to mine cryptocurrency. Security researcher Troy Mursch sounds off on why this tricky trend isn't going away anytime soon. Newsmaker Interviews Vulnerabilities Web Security Bitcoin Cryptocurrency cryptojacking cryptomining drupalgeddon 2.0 Hacks mining moneo

MGT splits from John McAfee, turns focus to digital coin mining

Information Management Resources

Hardware and software Data security Cyber securityThe firm has severed its relationship with the software expert and is considering a sale or spinoff of the cybersecurity arm he was meant to run.

Sales 32

Security Affairs newsletter Round 228

Security Affairs

The best news of the week with Security Affairs. Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency. Hackers are scanning the web for vulnerable Fortinet, Pulse Secure Products installs. A new round of the weekly newsletter arrived!

SpeakUp Linux Backdoor Sets Up for Major Attack

Threatpost

Cloud Security Malware backdoor cpx 360 Linux servers Malware analysis monero mining propagation techniques speakup TrojanArmed with an impressive bag of exploits and other tricks for propagation, researchers believe the new trojan could be the catalyst for an upcoming, major cyber-offensive.

This Alleged Bitcoin Scam Looked a Lot Like a Pyramid Scheme

WIRED Threat Level

Five men face federal charges of bilking investors of $722 million by inviting them to buy shares in bitcoin mining pools. . Business Business / Blockchain and Cryptocurrency Security