June 18, 2019 Outlaw Threat Group Using Botnet to Distribute Monero Miner, Perl-Based Backdoor 2 min read - The Outlaw threat group is using a botnet to distribute a Monero cryptocurrency miner and a Perl-based backdoor component.
June 18, 2019 InterPlanetary Storm Malware Using IPFS P2P Network to Hide Its Activities 2 min read - A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
June 17, 2019 Threat Actors Use Targeted Attack Tools to Distribute Cryptocurrency Miners, Ransomware 2 min read - Threat actors are using targeted attack tools to distribute typical malware, such as cryptocurrency miners and ransomware.
June 17, 2019 XENOTIME Threat Group Now Targeting Electric Utility Organizations 2 min read - In addition to oil and gas companies, the XENOTIME threat group has begun targeting electric utility organizations located in the U.S. and elsewhere.
June 12, 2019 Fraudsters Abuse Smartphone Google Calendar Feature to Push Through Scam Offers 2 min read - Fraudsters are abusing a Google Calendar feature that's commonly enabled on smartphones to target unsuspecting users with scam offers.
June 12, 2019 Latest Mirai Malware Variant Contains 18 Exploits, Focuses on Embedded IoT Devices 2 min read - Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.
June 11, 2019 Extortion Scam Threatens Website Owners With Reputational Damage 1 min read - A new extortion scam uses the threat of reputational damage to persuade website owners to pay a ransom fee.
June 11, 2019 Attack Campaign Exploits CVE-2019-2725, Abuses Certificate Files to Deliver Monero Miner < 1 min read - Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.
June 11, 2019 Windows 10 Zero-Day Lets Threat Actors Bypass Patch and Escalate Role to Admin Level 2 min read - Threat actors could use a recently discovered Windows 10 zero-day flaw to take over a computer and bypass local privilege escalation.
June 11, 2019 Fileless Attack Campaign Leverages PCASTLE to Distribute XMRig Monero-Mining Malware 2 min read - According to researchers, the fileless attack uses PCASTLE to distribute samples of XMRig, a well-known Monero-mining malware family.