cryptojacking
![server room](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13093457/server-room-400x200.jpg)
8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20122800/microsoft-storm-400x200.jpg)
Attackers abuse OAuth apps to initiate large-scale cryptomining and spam campaigns
Attackers are compromising high-privilege Microsoft accounts and abusing OAuth applications to launch a variety of financially-motivated attacks. Abusing OAuth applications …
![Apache ActiveMQ](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/21122152/apache_activemq-400x200.jpg)
Apache ActiveMQ bug exploited to deliver Kinsing malware
Attackers are exploiting a recently fixed vulnerability (CVE-2023-46604) in Apache ActiveMQ to install Kinsing malware and cryptocurrency miners on targeted Linux systems. …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10122853/linux-red-danger-400x200.jpg)
Looney Tunables bug exploited for cryptojacking
Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into …
![Jupyter](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/18095639/jupyter-1400-400x200.jpg)
Jupyter Notebooks targeted by cryptojackers
Cryptojackers are targeting exposed Jupyter Notebooks to install cryptominers and steal credential files for popular cloud services, researchers have uncovered. What are …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10161518/laptop-fire3-400x200.png)
Cryptojacking soars as cyberattacks increase, diversify
Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according to SonicWall. Overall …
![Apache NiFi](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/31153544/apache-nifi-400x200.jpg)
Someone is roping Apache NiFi servers into a cryptomining botnet
If you’re running an Apache NiFi instance exposed on the internet and you have not secured access to it, the underlying host may already be covertly cryptomining on …
![transfer.sh](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/02131615/transfersh-400x200.jpg)
Attackers increasingly using transfer.sh to host malicious code
For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105212/labyrinth-400x200.jpg)
Covert cyberattacks on the rise as attackers shift tactics for maximum impact
2022 was the second-highest year on record for global ransomware attempts, as well as an 87% increase in IoT malware and a record number of cryptojacking attacks (139.3 …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13142728/bomb-clock-time-400x200.jpg)
How fast do cybercriminals capitalize on new security weaknesses?
Threat intelligence analysts at Skybox Research Lab uncovered a 42% increase in new ransomware programs targeting known vulnerabilities in 2021. The report revealed how …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
Ransomware’s savage reign continues as attacks increase 105%
SonicWall released a report which details a sustained meteoric rise in ransomware with 623.3 million attacks globally. Nearly all monitored threats, cyberattacks and malicious …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103829/Linux2-400x200.jpg)
How cybercriminals are using malware to target Linux-based operating systems
As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders