Researchers at Talos Intelligence Group have noticed a sharp rise in DNS requests connected with its command-and-control servers since the end of August.
The IRS is offering a $625,000 contract to any individual or firm that can create a tool that tracks Monero or Layer 2 transactions.
The U.S. Department of Homeland Security has signed a $3.6 million contract with CipherTrace to create the Monero tracing tool.
Mitiga discovered the Monero mining malware when conducting a security audit for a financial services company.
The FritzFrog malware botnet has reportedly infected millions of IP addresses worldwide, targeting banks, educational and medical institutions, and government agencies.
The botnet uses a complex, extensive modular system and a mixture of techniques to compromise systems and hide its presence from end-users to mine for Monero.
A group of hackers known as Blue Mockingbird has been targeting enterprise systems and infecting them with Monero-mining malware without their knowledge.
The past week has seen several supercomputers in Europe hacked to mine Monero, including research institutions in Spain, the U.K., Switzerland and Germany.
Rand research listed three illicit use-cases for digital currencies: money laundering, trade in illicit goods and services, and terrorism financing.
That the Sodinokibi ransomware had begun accepting the Monero (XMR) digital currency in place of BTC.
Huobi Korea delisted Monero a few days ago after it emerged the darkcoin was used in a sex scandal involving minors. Bithumb is under pressure to do so too.