A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
A new family of crypto-mining malware dubbed ZombieBoy has been raking in roughly $1,000 a month worth of Monero by exploiting multiple vulnerabilities to create backdoors and evade defenses.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.
Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
Malicious cryptocurrency mining techniques have gobbled up approximately 5 percent of all Monero in circulation today, according to a recent study.
A new report named cryptojacking as one of the six most significant threats facing U.K. businesses in 2018.
Crypto-mining scams are on the rise as attackers see the value in virtual currency and discover ways to operate undetected on corporate networks.
XMRig is popular among cybercriminals because it is open source, meaning threat actors can make relatively simple changes to its code to convert the tool into a cryptojacking mechanism.
Cybercriminals altered Texthelp's Browsealoud web screen reader to install a cryptocurrency miner on many high-profile websites, including government sites in the U.S. and U.K.
A recent study found that more than half of organizations around the world experienced a cryptocurrency mining attack last month, a trend that will likely continue as the crypto gold rush gains steam.