Cryptojacking in the post-Coinhive era

Cryptojacking captured everyone’s attention in 2017 and 2018. With Coinhive no longer in business, has this threat been completely snuffed out?

Read more

Fake browser update seeks to compromise more MikroTik routers

Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

Read more

Obfuscated Coinhive shortlink reveals larger mining operation

A web miner injected into compromised sites is just the tip of the iceberg for an infrastructure hosting malicious Windows and Linux coin miners.

Read more

Malicious cryptomining and the blacklist conundrum

When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult.

Read more

The state of malicious cryptomining

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.

Read more

Deepfakes FakeApp tool (briefly) includes cryptominer

We take a look at what happens when one of the most popular DIY Deepfakes programs decides to monetise with a spot of coin mining. Surprise: it doesn’t end well.

Read more

Drive-by download campaign targets Chinese websites, experiments with exploits

This custom made drive-by download attack targets some Chinese websites and their visitors while experimenting with exploits.

Read more

Drive-by cryptomining campaign targets millions of Android users

Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.

Read more

Bank robbers 2.0: digital thievery and stolen cryptocoins

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.

Read more

Persistent drive-by cryptomining coming to a browser near you

If you think closing your browser window to leave a site that runs a cryptominer will stop the mining process, think again. Persistent drive-by cryptomining has arrived.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language