Cryptojacking stole the limelight away from ransomware at the end of 2017, becoming a major cyberthreat that continued into 2018. On March 8, 2019 Coinhive, the service that enables websites around the world to use browser CPUs to mine Monero, will shu…
Written by Adolf St?eda and Jan Neduchal
North Carolina water utility shut down by ransomware
Hurricane Michael, Florence, and now this. It seems North Carolina just can’t catch a break as one of its major water utilities went offline following a ransomware attack. The Onslow Water and Sewer…
Authors: Martin Hron and David Jursa
Cryptomining has grown so rampant that we’ve revised the guidelines for how our software identifies and classifies mining programs. Depending on the miner’s behavior, our software will label it as a Tool or as malware.
In the bustling industry of cybercrime, ransomware has always been a popular weapon of choice…until this year. In 2018, illicit cryptomining (AKA cryptojacking) took the title, surging 459%. Cryptojacking is the crime of using somebody else’s compute…
Bank phishing scam phones it in
Many banking customers in Brazil woke up to a rude shock as the security module they installed as instructed turned out to be a trojan. Dubbed Camubot, the Trojan malware proudly sports banking logos and other branding,…
Bank phishing scam phones it in
Many banking customers in Brazil woke up to a rude shock as the security module they installed as instructed turned out to be a trojan. Dubbed Camubot, the Trojan malware proudly sports banking logos and other branding,…
Steam game found to be secretly cryptomining
“Malicious cryptomining has become so popular among cybercriminals that it has earned its own name: cryptojacking,” states Avast security evangelist Luis Corrons. “It is one of the most popular ways to make…
BMWs at risk of hacking
BMW is in the process of issuing security patches to drivers of its 2017 i3, 2016 X1 and 525Li, and 2012 730Li. The patches will cover fourteen newly-discovered vulnerabilities, four of which can be triggered only through physical connection to the car computer systems, while another four require USB connection to the car. The remaining six vulnerabilities can be exploited remotely. A diligent cybercriminal can gain access to the cars’ infotainment systems, T-Box components, and UDS communication. In light of the findings, BMW has embraced the value of third-party cybersecurity research, and they are working on fixes.