#cryptojacking

[ follow ]
Information security
fromThe Hacker News
1 month ago

Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts

A malicious PyPI package impersonating SymPy installs an XMRig cryptocurrency miner on Linux by downloading and executing ELF payloads in memory.
Information security
fromThe Hacker News
2 months ago

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Threat actors use compromised AWS IAM credentials and novel persistence methods to deploy widespread crypto-mining across ECS and EC2, evading detection and extending operations.
Information security
fromThe Hacker News
5 months ago

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

A TOR-based cryptojacking campaign exploits exposed Docker APIs to deploy miners, establish persistence, scan for other Docker instances, and potentially build a botnet.
Information security
fromIT Pro
6 months ago

Rapper Bot was 'one of the most powerful DDoS botnets to ever exist' - now it's done and dusted

Ethan Foltz allegedly developed and operated the Rapper Bot botnet, enabling massive DDoS and cryptojacking attacks against devices worldwide, including a major outage at X.
Privacy professionals
fromSecuritymagazine
6 months ago

DevOps Missteps Fuel Crypto-Mining: Why Infrastructure Observability Is a Security Imperative

Cryptojacking poses a serious threat by exploiting misconfigured cloud environments, leading to significant cost increases and resource depletion.
fromThe Hacker News
7 months ago

3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics

"This was a stealth miner, designed to avoid detection by staying below the radar of both users and security tools," security researcher Himanshu Anand said.
Privacy professionals
#cybersecurity
fromThe Hacker News
9 months ago
Cryptocurrency

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

A new Linux cryptojacking campaign targeting Redis servers exploits legitimate commands to deploy a custom XMRig miner.
fromThe Hacker News
10 months ago
Cryptocurrency

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Cybercriminals are exploiting Docker environments to mine cryptocurrency using a novel approach via the Teneo service.
Cryptocurrency
fromThe Hacker News
9 months ago

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

A new Linux cryptojacking campaign targeting Redis servers exploits legitimate commands to deploy a custom XMRig miner.
DevOps
fromDevOps.com
8 months ago

DevOps Tools Under Siege: New Cryptojacking Campaign Exploits Misconfigurations to Mine Cryptocurrency - DevOps.com

DevOps tools are increasingly being targeted for cryptojacking campaigns.
The JINX-0132 actor uses public tools to evade detection.
HashiCorp Nomad is a newly exploited attack vector in cryptojacking.
[ Load more ]