Security News

Cryptojackers steal AWS credentials from GitHub in 5 minutes
2023-10-30 18:31

Security researchers have uncovered a multi-year cryptojacking campaign they claim autonomously clones GitHub repositories and steals their exposed AWS credentials. Given the name "EleKtra-Leak" by researchers at Palo Alto Networks's Unit 42, the criminals behind the campaign are credited with regularly stealing AWS credentials within five minutes of them being exposed in GitHub repositories.

Jupyter Notebooks targeted by cryptojackers
2023-10-18 11:29

Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. "Jupyter is a service that allows you to host individual snippets of code and lets others execute this code in an isolated environment. A Jupyter Notebook refers to an instance of the Jupyter web application," Matt Muir, Threat Research Lead at Cado Security, told Help Net Security.

Cryptojackers spread their nets to capture more than just EC2
2023-09-18 11:15

One newly spotted method targets services on the AWS platform, but not necessarily the ones you might think. Researchers from the Sysdig Threat Research Team have uncovered a cryptojacking operation dubbed "AMBERSQUID," which does not directly target EC2 instances that would trigger an approval for more resources.

Cryptojackers Keep Hacking Unpatched MikroTik Routers
2018-10-19 13:18

Vigilante Hacker Is Killing Unpatched Routers' Remote Administration AbilityCryptojackers and eavesdroppers are continuing to exploit a one-time zero-day flaw in unpatched MikroTik routers,...

Routers turned into zombie cryptojackers – is yours one of them?
2018-08-03 12:58

A patch was turned into an exploit and the exploit was turned into... why, CRYPTOCOINS, of course! Fortunately, there's an easy fix.

How to keep your browser and devices safe from cryptojackers
2018-01-02 21:36

Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts have found their way...