Researchers detected a cryptomining campaign brute-forcing IIS/SQL Microsoft servers using 100 percent of victims' compute resources.
Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.
Researchers at ESET discovered a malicious crypto-mining campaign launched via the Kodi platform that used add-on repositories to spread malware through Kodi's ecosystem and mine for Monero.
Researchers discovered two new monero malware attacks: one that targets Windows with stealthy mining operations, and another that masquerades as a Google Play Store update for Android.
Researchers observed a new threat actor known as Rocke leveraging a varied tool kit and multiple payloads to distribute cryptomining malware, including Monero miners.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
A new family of crypto-mining malware dubbed ZombieBoy has been raking in roughly $1,000 a month worth of Monero by exploiting multiple vulnerabilities to create backdoors and evade defenses.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.
Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
Malicious cryptocurrency mining techniques have gobbled up approximately 5 percent of all Monero in circulation today, according to a recent study.