cryptocurrency
Malicious Cryptomining is Exploding. Are you at risk?
Cryptocurrency is making it easier for hackers to get paid while protecting their anonymity. Malicious cryptomining is on the rise – moving more mainstream, and as a result, more profitable than ever. And the market volatility of cryptocurrency makes this emerging threat more financially lucra…
Cryptomining: A sheep or a wolf?
One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to convince them there are problems with their computers, or point-of-sale Trojan horses siphoning off credit ca…
Rocke: The Champion of Monero Miners
This post was authored by David Liebenberg. Summary Cryptocurrency miners are becoming an increasingly significant part of the threat landscape. These malicious miners steal CPU cycles from compromised devices to mine cryptocurrencies and bring in income for the threat actor. In this post, we look a…
Who Wants to Be a Millionaire? Create Your Own Crypto Currency on a Blockchain
At CiscoLive Barcelona I became a millionaire. I’m loaded. I couldn’t be happier. And all because we launched DevNetCoin! Now, technically, I’m only a millionaire in a token with no intrinsic value. But I’m still happy. So, that’s good. Do YOU want to be a millionaire (in your own crypto token)? Wi…
Cryptomining Campaign Returns Coal and Not Diamond
Soon after a launch of a new cryptocurrency, Bitvote, in January, Talos discovered a new mining campaign affecting systems in India, Indonesia, Vietnam and several other countries that was tied to Bitvote. Apart from the fact that the attackers have chosen to target the new bitcoin fork in order to…
The Many Tentacles of the Necurs Botnet
This post was written by Jaeson Schultz. Introduction Over the past five years the Necurs botnet has established itself as the largest purveyor of spam worldwide. Necurs is responsible for emailing massive amounts of banking malware, ransomware, dating spam, pump-n-dump stock scams, work from home…
Cryptojacking: Hijacking your computer resources
Your internet connection is slower than usual, your PC is also very slow, and you notice that your CPU fan is running faster when you are on a given website. All the above symptoms indicate that you could be a victim of cryptojacking. This is a new kind of menace in which malicious users or the host…
Cloud Unfiltered Podcast, Episode 18: Chris Riviere, Cisco
Cloud security is the kind of topic that can make you sigh, shake your head, and quickly look for some other, less daunting project to deal with—no doubt about it. I mean honestly—what do you even define as “cloud” in your particular environment, and what constitutes “secure”? Is your only job to wo…