A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
An analysis of more than 4.4 million malware samples showed botnets were responsible for crypto-mining at least 4.3 percent of Monero over a 12-year period.
Researchers discovered two new Satan variants targeting organizations in the financial sector with Monero miners and ransomware.
Researchers detected a cryptomining campaign brute-forcing IIS/SQL Microsoft servers using 100 percent of victims' compute resources.
Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.
Researchers at ESET discovered a malicious crypto-mining campaign launched via the Kodi platform that used add-on repositories to spread malware through Kodi's ecosystem and mine for Monero.
Researchers discovered two new monero malware attacks: one that targets Windows with stealthy mining operations, and another that masquerades as a Google Play Store update for Android.
Researchers observed a new threat actor known as Rocke leveraging a varied tool kit and multiple payloads to distribute cryptomining malware, including Monero miners.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
A new family of crypto-mining malware dubbed ZombieBoy has been raking in roughly $1,000 a month worth of Monero by exploiting multiple vulnerabilities to create backdoors and evade defenses.