A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
X-Force researchers observed attackers targeting multinational corporations in various sectors using malicious scripts to automate attacks on misconfigured servers.
Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.
X-Force data revealed that while browser-based cryptojacking was increasingly popular through most of 2018, cryptomining malware made a resurgence at the end of 2018 and into Q1 2019.
IBM X-Force saw a decline in ransomware in 2018 as cybercriminals shifted tactics to cryptojacking and attacks that don’t leverage malware.
Security analysts identified a sample of Linux crypto-mining malware that kills any other malicious miners upon installation.
Security researchers observed an attack campaign that is targeting Linux servers to install samples of the new SpeakUp Trojan.
An analysis of more than 4.4 million malware samples showed botnets were responsible for crypto-mining at least 4.3 percent of Monero over a 12-year period.
Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.
Researchers discovered two new Satan variants targeting organizations in the financial sector with Monero miners and ransomware.