#cryptojacking

[ follow ]
Privacy professionals
fromSecuritymagazine
2 weeks ago

DevOps Missteps Fuel Crypto-Mining: Why Infrastructure Observability Is a Security Imperative

Cryptojacking poses a serious threat by exploiting misconfigured cloud environments, leading to significant cost increases and resource depletion.
fromThe Hacker News
3 weeks ago

3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics

"This was a stealth miner, designed to avoid detection by staying below the radar of both users and security tools," security researcher Himanshu Anand said.
Privacy professionals
#cybersecurity
fromThe Hacker News
2 months ago
Cryptocurrency

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

A new Linux cryptojacking campaign targeting Redis servers exploits legitimate commands to deploy a custom XMRig miner.
fromThe Hacker News
3 months ago
Cryptocurrency

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Cybercriminals are exploiting Docker environments to mine cryptocurrency using a novel approach via the Teneo service.
Cryptocurrency
fromThe Hacker News
2 months ago

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

A new Linux cryptojacking campaign targeting Redis servers exploits legitimate commands to deploy a custom XMRig miner.
fromDevOps.com
2 months ago

DevOps Tools Under Siege: New Cryptojacking Campaign Exploits Misconfigurations to Mine Cryptocurrency - DevOps.com

DevOps tools are increasingly being targeted for cryptojacking campaigns.
The JINX-0132 actor uses public tools to evade detection.
HashiCorp Nomad is a newly exploited attack vector in cryptojacking.
[ Load more ]