An analysis of more than 4.4 million malware samples showed botnets were responsible for crypto-mining at least 4.3 percent of Monero over a 12-year period.
Researchers discovered two new Satan variants targeting organizations in the financial sector with Monero miners and ransomware.
Researchers detected a cryptomining campaign brute-forcing IIS/SQL Microsoft servers using 100 percent of victims' compute resources.
Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.
Researchers at ESET discovered a malicious crypto-mining campaign launched via the Kodi platform that used add-on repositories to spread malware through Kodi's ecosystem and mine for Monero.
Researchers discovered two new monero malware attacks: one that targets Windows with stealthy mining operations, and another that masquerades as a Google Play Store update for Android.
Researchers observed a new threat actor known as Rocke leveraging a varied tool kit and multiple payloads to distribute cryptomining malware, including Monero miners.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
A new family of crypto-mining malware dubbed ZombieBoy has been raking in roughly $1,000 a month worth of Monero by exploiting multiple vulnerabilities to create backdoors and evade defenses.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.