Criminal campaign uses leaked NSA tools to set up cryptomining scheme, Trend Micro says
The research is a reminder that it is not just state-sponsored hackers that have reportedly co-opted the leaked NSA tools.
Binance cryptocurrency exchange blames hackers in theft of $40 million in bitcoin
“The hackers had the patience to wait, and execute well-orchestrated actions through multiple seemingly independent accounts at the most opportune time,” the company said.
Financial crime outpaces espionage as top motivation for data breaches, Verizon report finds
The figures again demonstrate how, despite an industrywide focus on technology, many breaches require human trust to be successful.
Chinese hackers found and repurposed elite NSA-linked tools
Symantec has evidence that Chinese-linked hackers were using NSA-authored tools at least a year before they were publicly leaked by the Shadow Brokers.
International cops shutter two dark web sites, arrest three accused of running Wall Street Market
Wall Street Market featured more than 1.15 million customer accounts and 5,400 registered sellers who accepted payments in bitcoin and Monero.
Meet Sodinokibi, a ransomware strain that exploits a critical Oracle server flaw
Digital extortionists are exploiting a bug with a severity score of 9.8 out of 10 that Oracle sought to squash with a patch issued last week.
Cyberattack at med-tech conglomerate Hoya slowed production at Thai factory by 60 percent
Roughly 100 computers were infected with malicious software that stole user credentials, then tried to install a program that would co-opt those machines into mining for cryptocurrency.
The 'permission' question is much different for iOS and Android apps, researchers say
An Android app might be more likely to ask for access to technical functions. An iOS app might seek to use sensitive features, like the microphone. In any case, Wandera says, know what you're getting into.
That battery-saving app may have used your device to mine Monero, Symantec says
Microsoft has removed the apps from its store.
Cryptojacking malware gets past cloud security programs by uninstalling them
Palo Alto Networks says this type of evasive technique is likely to keep popping up.