HackDig : Dig high-quality web security articles for hacker

Threat actors using default SSH credentials to hijack Ethereum miners

Attackers scanned for the entire IPv4 range and look for Ethereum miners with open SSH connections. Hackers target Ethereum-mining farms in the attempt to hijack the funds by replacing the user’s wallet with their one. The attacks were first spotted on Monday, threat actors attempted to change the default configuration of Ethereum miners. “Illicit digi
Publish At:2017-11-03 08:40 | Read:1216 | Comments:0 | Tags:Breaking News Hacking cryptocurrency Cybercrime Ethereum min

The Blockchain Is Only as Strong as Its Weakest Link

This is the first installment in a three-part series. Blockchain-based applications will revolutionize the way people and organizations interact with each other and the Internet of Things (IoT) — and rightfully so. Based on the foundational principles of trust, blockchain has the potential to solve real-life business challenges within every sector. Permissio
Publish At:2017-10-27 14:00 | Read:1084 | Comments:0 | Tags:Banking & Financial Services Data Protection Blockchain Cryp

A new Ethereum ICO was hacked, the victim is Etherparty

The Etherparty website is the last victim in order of time of a cyber attack involving an Ethereum ICO (Initial Coin Offering). Another hack involving an Ethereum ICO (Initial Coin Offering) made the headlines, the victim is the Etherparty website that sells tokens for a blockchain-based smart contract tool. The attackers replaced the legitimate address fo
Publish At:2017-10-04 22:40 | Read:729 | Comments:0 | Tags:Breaking News Cyber Crime Hacking cryptocurrency Cybercrime

Cybercrime’s Cryptocurrency Gold Rush: Going Strong!

What’s the connection between cybercrime and cryptocurrencies? Perhaps it would suffice to say that the reasons for criminals adopting the cryptocoin are quite obvious. But when did this all start, and what fuels it and gets fueled in return? This blog will go over some of the historical reasons that connect cybercrime and cryptocurrency as well as exa
Publish At:2017-10-04 21:35 | Read:1366 | Comments:0 | Tags:Fraud Protection Threat Intelligence Bitcoin Bitcoin Mining

EITest Campaign Uses Tech Support Scams to Deliver Coinhive’s Monero Miner

We’ve uncovered the notorious EITest campaign delivering a JavaScript (JS) cryptocurrency miner (detected by Trend Micro as HKTL_COINMINE) using tech support scams as a social engineering lure. These are fraud activities impersonating legitimate technical support services, conning unwitting victims to avail/pay for these services (or hand out financial data)
Publish At:2017-09-22 21:10 | Read:1276 | Comments:0 | Tags:Bad Sites cryptocurrency cryptocurrency miner EITest Tech Su

Building Digital Trust, One Blockchain at a Time

Since it first appeared in 2009, the bitcoin network has grown significantly. The digital currency’s recent surge in value has sparked discussions within the security space about the benefits of blockchain, a technology that promotes the type of trust that is sorely lacking in some digital transactions. Today, people are exchanging real money for cryp
Publish At:2017-09-22 13:40 | Read:1015 | Comments:0 | Tags:Banking & Financial Services Authentication Bitcoin Blockcha

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks. According to IBM Managed Security Services (MSS) data,
Publish At:2017-09-19 12:00 | Read:1267 | Comments:0 | Tags:Advanced Threats Security Services Threat Intelligence X-For

Cryptocurrency Miner Uses WMI and EternalBlue To Spread Filelessly

By Buddy Tancio Fileless malware can be a difficult threat to analyze and detect. It shouldn’t be a surprise that an increasing number of new malware threats are fileless, as threat actors use this technique to make both detection and forensic investigation more difficult. We recently found a new cryptocurrency miner (which we detect as TROJ64_COINMINER.QO)
Publish At:2017-08-21 22:35 | Read:1523 | Comments:0 | Tags:Exploits Malware cryptocurrency EternalBlue WMI

Is Blockchain the Key to Stopping Ransomware Attacks?

We all remember the devastating WannaCry ransomware attack that struck organizations around the world in May 2017. The attack spread at a rate of almost 3,600 computers per hour, or about one per second. When all was said and done, the ransomware infected more than 300,000 devices. Many victims simply paid the ransom to retrieve their locked files. This only
Publish At:2017-07-13 23:10 | Read:830 | Comments:0 | Tags:Fraud Protection Best Practices Bitcoin Blockchain Cryptocur

Funny Money: Exploring the Connection Between Bitcoin and Ransomware

After the WannaCry attack, no fewer than five threat research companies pounced on the fact that the ransomers were demanding to be paid in bitcoin. However, they completely glossed over the concept behind the malware itself. Within days, theorists came out of the woodwork to characterize the attack as some kind of subtle terrorist or government-backed opera
Publish At:2017-06-27 20:30 | Read:1089 | Comments:0 | Tags:Data Protection Fraud Protection Bitcoin Black Market Crypto

Not Just WannaCry: the EternalBlue Exploit Gives Rise to More Attacks

Since EternalBlue was first published, has anyone else used it? Or only the creators of WannaCry? Before we answer that question, let’s take a look at the history of the vulnerability that gave way to the EternalBlue exploit. October 25, 2001: Microsoft launches the Windows XP operating system, one of the company’s biggest successes. It contains,
Publish At:2017-05-19 02:30 | Read:1547 | Comments:0 | Tags:PandaLabs cryptocurrency eternalblue wannacry exploit

Regulators Want In on the Blockchain Party in 2017

Financial institutions, real estate brokers, law firms and other organizations with an interest in trust-based transactions will be swarming blockchain in 2017, and you can bet regulators will be right behind them. The end of 2016 marks blockchain’s evolution from niche curiosity to corporate up-and-comer as institutions seek ways to benefit from reduc
Publish At:2016-12-21 11:45 | Read:3306 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Bitcoin Blockc

In 2017, Blockchain Gets Serious

When I became Global Blockchain Lead for Security Services at IBM in January 2016, I had no idea what kind of year awaited me. Just a few highlights: In February, IBM introduced developer services on the Bluemix cloud to enable rapid creation and monitoring of blockchain applications. In April, IBM launched a new set of highly secure blockchain services on
Publish At:2016-11-28 09:40 | Read:4012 | Comments:0 | Tags:Banking & Financial Services Industries Banking Bitcoin Bloc

Selling Online Gaming Currency: How It Makes Way for Attacks Against Enterprises

Offhand, companies and enterprises being affected by attacks like DDoS against the online gaming industry may be far-fetched. But the gaming industry, being a billion-dollar business with a continuously growing competitive community, is naturally bound to garner attention from cybercriminals. A recent wire fraud case, for instance, allowed a group of hackers
Publish At:2016-11-24 02:35 | Read:1744 | Comments:0 | Tags:Bad Sites Malware Social cryptocurrency DDoS online gaming o

Mal/Miner-C mining malware leverages NAS devices to spread itself

Experts from Sophos discovered Mal/Miner-C, a malware designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. Malware researchers from security firm Sophos have analyzed a new strain of malware detected as Mal/Miner-C that was designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. The experts
Publish At:2016-09-12 05:30 | Read:1616 | Comments:0 | Tags:Breaking News Cyber Crime Malware cryptocurrency Cybercrime

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud