
Malicious WordPress plugin can secretly mine crypto
In their efforts to find new ways to attack their victims, attackers are now hiding cryptojacking malware in a WordPress plugin.
In their efforts to find new ways to attack their victims, attackers are now hiding cryptojacking malware in a WordPress plugin.
In an intriguing week, malware evolved, China, Wales and Canada explored CBDCs and blockchain finally hit Broadway, and no, it wasn’t for the ‘Satoshi Musical.’
The latest campaign involves hiding malware in WAV audio files which can mine crypto and give access to the victim’s computer.
After falling victim to ransomware, some users are finding a great way to get their revenge.
Known as Masad Stealer, the malware receives commands from a Telegram bot. It replaces crypto addresses and steals sensitive data from its hosts.
McAfee Labs confirmed the rise in cryptojacking campaigns, indicating that cryptojacking malware had shot up by 29% in the first quarter of 2019.
The group is thought to have built up an arsenal of $90,000 worth of cryptocurrency, gained from the use of undetected mining malware and so-called remote access tools (RATs).
Known as Skidmap, the malware is not only harder to detect, it also gives the attackers unfiltered access to the affected system.
Kaspersky has identified a number of infected digital courseware material that conceals WinLNK.Agent.gen, a delivery agent for the malware.
The malware, which has posed a dangerous threat for months, has recently been discovered to use the BTC blockchain to stay alive.
McAfee Labs revealed that as the crypto market grew, so did attacks.
Emsisoft, a leading antivirus company, has developed a tool that makes removing the infection simple without compromising the integrity of the user’s data.