Security News > 2018 > February > Avoid Becoming a Crypto-Mining Bot: Where to Look for Mining Malware and How to Respond
2018-02-28 17:16
At a white elephant party in northern Colorado in December, a friend of mine was telling me that he’d borrowed against his children’s college funds to put money into three different cryptocurrencies. “I didn’t realize you followed the community,” I said. read more
News URL
Related news
- Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks (source)
- Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining (source)
- New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (source)
- Linux malware “perfctl” behind years-long cryptomining campaign (source)
- Linux systems targeted with stealthy “Perfctl” cryptomining malware (source)
- Crypto-stealing malware campaign infects 28,000 people (source)
- Perfctl malware strikes again as crypto-crooks target Docker Remote API servers (source)
- North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS (source)
- North Korean hackers use new macOS malware against crypto firms (source)