Displaying items by tag: Monero

Microsoft Windows servers around the globe are playing host to a mining botnet known as Smominru Monero, which may have made as much as US$3.6 million for its operators based on the current value of the monero cryptocurrency.

Published in Security

If no major ransomware outbreaks have been witnessed for more than six months, then the reason is probably that most hackers who earn a mite from such exercises are now concentrating on a quieter way of making money: slipping cryptocurrency mining scripts onto users' PCs.

Published in Security

Malicious attackers have been caught using cryptocurrency mining scripts in ads served by YouTube, with Google's DoubleClick advertising platform being used to serve the scripts to users in some countries.

Published in Security

Malicious attackers have launched a campaign aimed at the Apache Struts Web framework, and are using NSA exploits leaked by the Shadow Brokers to spread laterally on internal networks after compromising a system.

Published in Security

Android malware is common these days but security vendor Kaspersky Lab says it has encountered one which stands out for the range of activities it can carry out once it has infected a device: mining digital currencies, annoying users with constant ads, launching DDoS attacks from the affected device and more.

Published in Security

A Windows trojan known as CryptoShuffler steals cryptocurrencies using a very simple mechanism: it replaces any cryptocurrency wallet address on a user's clipboard with one of its own.

Published in Security
Tuesday, 26 September 2017 09:41

Cryptocurrency miner found on Showtime websites

The Coinhive miner which mines for the monero cryptocurrency was found on the websites of Showtime Networks on Saturday but the company has yet to make any public statement about it.

Published in Security

Researchers at security firm Trend Micro say they have discovered a new campaign that aims to implant a cryptocurrency miner when users visit infected websites using Chrome or Internet Explorer.

Published in Security
Page 2 of 2




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News