Security News
Security researchers have uncovered a multi-year cryptojacking campaign they claim autonomously clones GitHub repositories and steals their exposed AWS credentials. Given the name "EleKtra-Leak" by researchers at Palo Alto Networks's Unit 42, the criminals behind the campaign are credited with regularly stealing AWS credentials within five minutes of them being exposed in GitHub repositories.
Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. "Jupyter is a service that allows you to host individual snippets of code and lets others execute this code in an isolated environment. A Jupyter Notebook refers to an instance of the Jupyter web application," Matt Muir, Threat Research Lead at Cado Security, told Help Net Security.
One newly spotted method targets services on the AWS platform, but not necessarily the ones you might think. Researchers from the Sysdig Threat Research Team have uncovered a cryptojacking operation dubbed "AMBERSQUID," which does not directly target EC2 instances that would trigger an approval for more resources.
Vigilante Hacker Is Killing Unpatched Routers' Remote Administration AbilityCryptojackers and eavesdroppers are continuing to exploit a one-time zero-day flaw in unpatched MikroTik routers,...
A patch was turned into an exploit and the exploit was turned into... why, CRYPTOCOINS, of course! Fortunately, there's an easy fix.
Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts have found their way...