Crooks have no scruples when it comes to making money. Any high-traffic website is a good target for setting up a cryptocurrency mining operation, and the Make-A-Wish charitable organization makes no exception.
Adversaries looking for an easy way to mine for cryptocurrency are actively targeting publicly exposed Docker services. They use a malicious script capable to scan the network in search of vulnerable hosts and compromise them.
Trend Micro has recently spotted an attacker that is scanning for exposed Docker Engine APIs and utilizing them to deploy containers that download and execute a coin miner. These containers then use scripts to spread to other systems.
Two-dozen Android apps recently made it into Google Play with code that turns users' phones into cryptocurrency mining workers. Some of them target users in the US by using the guise of educational tools.
A new botnet captured the attention of security researchers through its harmless behavior and the use of an original communication channel with its command and control center.
Ever since exploit code for CVE-2018-14847 became publicly available, miscreants have launched attacks against MikroTik routers. Thousands of unpatched devices are mining for cryptocurrency at the moment.
A research paper published at the start of the month estimates that Coinhive, a service for in-browser cryptocurrency mining, often abused by cyber-criminals, is making around a quarter of a million US dollars per month in mined Monero.
Security researchers have unearthed a massive cryptojacking campaign that targets MikroTik routers and changes their configuration to inject a copy of the Coinhive in-browser cryptocurrency mining script in some parts of users' web traffic.
Cybercriminals appear to have an obsession with abusing GitHub and GitHub-related services to hide in-browser cryptocurrency mining scripts that they later use on hacked sites.
Chinese police have arrested 16 employees of a local IT company on charges of hacking after deploying cryptocurrency miners on thousands of computers at Internet cafes in 30 cities.
When the CPU utilization on a computer is high, games become less responsive, frame rate goes down, and gameplay stutters. To diagnose these problems, users will commonly open process manager utilities such as Task Manager, Process Explorer, or Process Hacker to determine if any processes are using too much of the CPU power.
Mozilla developers are working on an improved Tracking Protection system for the Firefox browser that will land in version 63, scheduled for release in mid-October.
After the publication of two severe security flaws in the Drupal CMS, cybercrime groups have turned their sights on this web technology in the hopes of finding new ground to plant malware on servers and make money through illegal cryptocurrency mining.
Security researchers say they've identified at last 1,000 Magento sites that have been hacked by cybercriminals and infected with malicious scripts that steal payment card details or are used as staging points in the delivery of other malware.
Google announced that effective today, the Chrome Web Store review staff would stop accepting new extensions on the Web Store that perform cryptocurrency mining operations.