Remove Education Remove Industry Remove Mining
article thumbnail

Cryptocurrencies and cybercrime: A critical intermingling

Security Affairs

Emerging threats Cybercrime often exploits precisely the lack of regulation and centralized controls of cryptocurrencies to deceive investors and embezzle funds through various forms of phishing, investment scams, digital wallet theft, ransomware, and illegal mining.

Education 316
article thumbnail

Vollgar botnet has managed to infect around 3k MSSQL DB servers daily

Security Affairs

Cybersecurity researchers spotted a crypto-mining botnet, tracked as Vollgar, that has been hijacking MSSQL servers since at least 2018. Researchers at Guardicore Labs discovered a crypto-mining botnet , tracked as Vollgar botnet , that is targeting MSSQL databases since 2018. and Windows Script Host Object Model (wshom).

Mining 353
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Steelcase office furniture giant hit by Ryuk ransomware attack

Security Affairs

Steelcase is a US-based furniture company that produces office furniture, architectural and technology products for office environments and the education, health care and retail industries. Bleeping Computer, citing a source in the cybersecurity industry, confirmed that Steelcase suffered a Ryuk ransomware attack.

article thumbnail

Access to over 3,000 compromised sites sold on Russian black marketplace MagBo

Security Affairs

Most of the compromised websites are e-commerce sites, but crooks also offered access to websites of organizations in healthcare, legal, education and insurance industries and belonging to government agencies. According to the experts, most of the compromised servers are from U.S., Russian, or German hosting services.

Access 278
article thumbnail

Updated Kmsdx botnet targets IoT devices

Security Affairs

The malware was employed in cryptocurrency mining campaigns and to launch denial-of-service (DDoS) attacks. The malicious code was used in attacks targeting multiple sectors including the gaming industry, technology industry, and luxury car manufacturers. ” reads the report published by Akamai.

IoT 246
article thumbnail

Flaws in Social Warfare plugin actively exploited in the wild

Security Affairs

Experts pointed out that attackers can exploit the vulnerabilities to take complete control over websites and servers and use them for malicious purposed, such as mining cryptocurrency or deliver malware. ” Experts found about 40,000 sites that are using the Social Warfare plugin, most of which are running a vulnerable version.

Mining 259
article thumbnail

Deceptive Google Meet Invites Lures Users Into Malware Scams

eSecurity Planet

Matanbuchus and XMRig: Used for cryptocurrency mining, these malware strains can slow down systems while surreptitiously utilizing computing resources. AMOS stealer: Specifically targets macOS systems, stealing sensitive data and credentials. Lumma stealer: Designed to harvest personal information and sensitive data from infected devices.

Phishing 124