Compromised Monero software steals coins from users
An XMR Core Development Team member alerted Reddit readers that the binaries of the command-line interface (CLI) wallet users were downloading were briefly altered.
An XMR Core Development Team member alerted Reddit readers that the binaries of the command-line interface (CLI) wallet users were downloading were briefly altered.
In their efforts to find new ways to attack their victims, attackers are now hiding cryptojacking malware in a WordPress plugin.
In an intriguing week, malware evolved, China, Wales and Canada explored CBDCs and blockchain finally hit Broadway, and no, it wasn’t for the ‘Satoshi Musical.’
The latest campaign involves hiding malware in WAV audio files which can mine crypto and give access to the victim’s computer.
After falling victim to ransomware, some users are finding a great way to get their revenge.
Known as Masad Stealer, the malware receives commands from a Telegram bot. It replaces crypto addresses and steals sensitive data from its hosts.
McAfee Labs confirmed the rise in cryptojacking campaigns, indicating that cryptojacking malware had shot up by 29% in the first quarter of 2019.
The group is thought to have built up an arsenal of $90,000 worth of cryptocurrency, gained from the use of undetected mining malware and so-called remote access tools (RATs).
Known as Skidmap, the malware is not only harder to detect, it also gives the attackers unfiltered access to the affected system.
Kaspersky has identified a number of infected digital courseware material that conceals WinLNK.Agent.gen, a delivery agent for the malware.
The malware, which has posed a dangerous threat for months, has recently been discovered to use the BTC blockchain to stay alive.
McAfee Labs revealed that as the crypto market grew, so did attacks.