Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.
A web miner injected into compromised sites is just the tip of the iceberg for an infrastructure hosting malicious Windows and Linux coin miners.
When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult.
We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.
This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.
Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.
A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.
If you think closing your browser window to leave a site that runs a cryptominer will stop the mining process, think again. Persistent drive-by cryptomining has arrived.