Unit 42, the global threat intelligence team at Palo Alto Network, discovered Mac malware that can steal cookies linked to crypto exchanges and wallets. Although usernames and passwords may not be sufficient to initiate withdrawals at crypto exchanges, if hackers manage to steal a combination of login credentials, web cookies, authentication cookies, and SMS data, it could steal user funds. The researchers explained: “CookieMiner tries to navigate past the authentication process by stealing a combination of the login credentials, text messages, and web cookies. If the bad actors successfully enter the websites using the victim’s identity, they could perform fund
According to reports from cybersecurity researchers, there’s a new ransomware virus on the loose that’s targeting bitcoin miners. A file locking program called H-Ant has allegedly infected certain Antminer models in China and if the ransom is not paid the software aims to destroy the infected machine.
In an apparent first, a relatively new form of malware uninstalls security programs to avoid detection and mine crypto on cloud servers.
An attack on the Electrum bitcoin wallet has so far netted hackers over 200 bitcoin worth around $ 750,000. The attack began on December 21, 2018. Though it has victimized some unsuspecting users, it can be avoided. Electrum is a Bitcoin wallet which doesn’t require the user to download the full blockchain. Instead, servers remotely provide
The post Bitcoin Wallet Malware Scam Targets Electrum Users And Garners Over 200BTC appeared first on CCN
Did you know that crypto mining malware has increased 4,000% in 2018? As crypto usage and popularity has rapidly grown since the end of 2017, so has the efforts of cybercriminals to exploit the growth for their own ill-gotten gains. The stats come from a recent McAfee report that has detailed the sharp rise of
The post McAfee Says Crypto Mining Malware Increased 4,000% in 2018 appeared first on CCN
A malware used to mine the Monero cryptocurrency is relying on constant improvements to avoid detection and increase the chances of success. According to researchers at Israeli cybersecurity firm Check Point Software Technologies, the malware which is known as KingMiner will likely continue getting updated in the future in order to increase the probability of
The post Cryptojacking Malware KingMiner Evades Detection to Mine Monero appeared first on CCN
Cyber criminals seem to have reached a new low, as they have targeted the site of one of the most popular children’s foundations in the world and infected it with crypto mining malware. In a published report this week, researchers from security firm Trustwave reported that a CoinImp crypto mining script was injected into the
The post Make-A-Wish-Foundation Website Infected with Crypto Mining Malware appeared first on CCN
Researchers at computer security firm McAfee Labs discovered a lethal new cryptojacking malware called “WebCobra,” which steals victims’ computing power to mine the cryptocurrencies Monero or Zcash secretly. The spike in cryptocurrency prices has inspired a new wave of cybercriminals, who use malware to cannibalize unsuspecting victims’ computers to mine crypto. Infections Spotted In Brazil, … Continued
The post ‘WebCobra’: McAfee Spots Russian Malware Mining Monero and Zcash appeared first on CCN
The obfuscation capabilities of cryptocurrency mining malware creators are increasingly getting more and more sophisticated, according to cybersecurity researchers at Trend Micro. This is evidenced by a new cryptocurrency mining malware that the researchers came across which employs multiple evasion techniques in order to evade detection. Identified as Coinminer.Win32.MALXMR.TIAOODAM, the malicious crypto mining software poses
The post Malware Not Found: How Cryptojackers Use Sophisticated Methods to Avoid Detection appeared first on CCN
Bitcoin mining malware is a big problem. By hijacking the blockchain to illicitly mine Bitcoin, hackers are able to carry out a number of exploits on the blockchain that can in turn damage assets held by investors all over the world. Annoyingly, as the security of the blockchain develops and as we create more innovative ways of protecting the blockchain, hackers also get more clever, as does the malware they produce.
According to new research, it seems that the latest fad in malicious crypto mining comes in the form of legitimate windows installation packages, making the malware hard to detect for both the user, and their machines antivirus software.
Five men in South Korea were arrested on Thursday for illicitly injecting crypto mining malware into more than 6,000 computers. Local police and the Korean National Police Agency Cyber Bureau said in an official statement that a group of five hackers led by a 24-year-old Kim Amu-gae released 32,435 emails containing cryptocurrency mining malware targeting
The post 5 Arrested in South Korea For Injecting Crypto Mining Malware in 6,000 PCs appeared first on CCN
In today’s edition of The Daily we cover stories about Robinhood expanding to its 25th American state, recently discovered mining malware, Coinbase ditching its crypto index fund, and a new blockchain job for a former advisor to president Trump.
Robinhood Reaches 25th State
Robinhood Markets, the stocks, options and crypto brokerage app, has reached its 25th U.S. state. This means its free trading app is now available across half of America. The Menlo Park-headquartered company announced this week that it has expanded its services to Ohio.
Palo Alto Networks warned this week that fake Adobe Flash Player updates carrying cryptocurrency mining malware are on the increase.
In its latest blog post, the cybersecurity company reveals that it has uncovered more of the fake Flash updates during its work and research than ever before.
These fake updates use pop up notifications from the official Adobe installer. If the update is run by the system user, it will add cryptocurrency mining malware like the XMRig cryptocurrency miner. It may also update the system’s Flash Player to the latest version, making it less likely for a user to notice the malware.
It has been discovered that fake Adobe Flash updates are being used to surreptitiously install cryptocurrency mining malware on computers and networks, creating severe losses in time, system performance, and power consumption for affected users. Cryptojacking Breaks New Ground While fake Flash updates that push malware have traditionally been easy to spot and avoid, a
The post PSA: Hackers Are Using Fake Flash Updates to Hide Cryptocurrency Mining Malware appeared first on CCN
The popularity of Fortnite, the multi-platform battle royale game, has surged higher than anyone could have anticipated in 2018. So much so that it has now drawn the attention of malicious cryptocurrency hackers. According to a recent report by Malwarebytes, which develops an anti-malware software for Microsoft Windows, macOS, Android and iOS, a number of malicious […]
The release of season six for the popular Fortnite video game has inspired the development of bitcoin-stealing malware disguised as game cheating tools. Malwarebytes Labs has discovered malware disguised as cheat tools that can steal data and bitcoin from Fortnite gamers, according to Christopher Boyd, the lead malware intelligence analyst. Malwarebytes Labs found the malware … Continued
Earlier this week, the Monero (XMR) community announced the launch of a new website that aims to educate users on cleaning up crypto-jacking malware and ransomware. Easing Malware Victims’ Confusion and Frustration The ease of mining and privacy of Monero are standout features for the coin. However, the features attract bad actors who use the coin
The post Monero Launches Initiative to Combat Cryptocurrency Mining Malware appeared first on CCN
Monero has officially released its Malware Response Workgroup website yesterday. In an effort to help protect Monero’s community, the website aims to provide resources to educate about the types of malware that may take advantage of users. It provides support for problems including unwanted in-browser and system mining (cryptojacking) and ransomware, all which have been a growing problem as of late.
In a blog post by Justin Ehrenhofer on the Monero website, the Malware Response Workgroup is “a self-organized set of volunteers that maintains these resources and provides live support.”
A lot of things are happening in the world of malware and ransomware. Cryptocurrency remains a very prominent target for criminals in this regard. A new malware, which goes by the name of Xbash, seems to combine all of the worst aspects of different malware types into one. A worrisome development, especially if this becomes a growing trend.
XBash is a Very Serious Threat
Cryptocurrency enthusiasts have seen their fair share of experiences with malware in different forms. Wallet-stealers, clipboard-information altering software, ransomware, and Trojans are just some of the examples. As if that is not enough, it now seems cryptojacking is becoming incredibly popular, with hundreds of thousands of devices infected by this type of malware over the past few months.
Botnets have become increasingly powerful over the last few years, to the point where the US Department of Homeland Security admitted that they couldn’t face the problem alone and needed help from the white hat community. Botnets consist of dozens, hundreds, or even thousands of internet-connected devices which are then used to carry out to
The post Vigilante Botnet Infects Computers to Remove Cryptocurrency Malware appeared first on CCN