Article / Jun 23, 2018
Attackers continue to find new and creative ways to carry out malicious crypto-mining operations, employing multiple exploits in a single campaign.
Article / Jun 21, 2018
With the vast availability of new exploits and the competition for victims’ resources, the multi-exploit trend continues to be popular among attackers.
Article / Jan 3, 2018 (MODIFIED: Jan 25, 2018)
A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
Article / Dec 15, 2017 (MODIFIED: Jan 18, 2018)
Zealot Apache Struts campaign targets vulnerabilities in Windows, Linux, and DotNetNuke, then uses leaked NSA exploits to mine Monero on internal networks.
Article / Nov 15, 2016 (MODIFIED: Jul 6, 2017)
A new DDoS attack vector that leverages LDAP for reflection-amplification attacks is seeing increased usage.
Article / Oct 6, 2016 (MODIFIED: Jul 6, 2017)
The Mirai botnet has infected hundreds of thousands of Internet of Things (IoT) devices, specifically security cameras, by using vendor default passwords for Telnet access.
Article / Jun 1, 2016 (MODIFIED: Jul 6, 2017)
Anonymous commoditizes well-known DDoS attacks by making easy-to-use tools, available to even the most unsophisticated user.