Avoid Becoming a Crypto-Mining Bot: Where to Look for Mining Malware and How to Respond

/ Apr 3, 2018

By david holmes

People are mining coins all over the place-all it costs is money for the power bill. So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency.

Beware of Attackers Stealing Your Computing Power for their Cryptomining Operations

Blog / Feb 15, 2018

By travis kreikemeier

As the black-market price for stolen data declines, attackers turn to cryptojacking schemes to maximize their profits—all at your expense.

A Spectre of Meltdowns Could be in Store for 2018, Including Fileless Malware Attacks and More Costly Bots

Blog / Jan 10, 2018 (MODIFIED: Jan 15, 2018)

By lori macvittie

Every week, another bug, vulnerability, or exploit is released—we need a multi-layered security strategy to deal with threats like Spectre and Meltdown.

New Python-Based Crypto-Miner Botnet Flying Under the Radar

Article / Jan 3, 2018 (MODIFIED: Jan 25, 2018)

By maxim zavodchik liron segal aaron brailsford

A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.

Zealot: New Apache Struts Campaign Uses EternalBlue and EternalSynergy to Mine Monero on Internal Networks

Article / Dec 15, 2017 (MODIFIED: Jan 18, 2018)

By maxim zavodchik liron segal

Zealot Apache Struts campaign targets vulnerabilities in Windows, Linux, and DotNetNuke, then uses leaked NSA exploits to mine Monero on internal networks.

NSA, CIA Leaks Provide a Roadmap to Stealthier, Faster, More Powerful Malware Like SambaCry and NotPetya

Blog / Jun 27, 2017 (MODIFIED: Aug 9, 2017)

By mike convertino

Recent NSA, CIA leaks expose advanced techniques for building automated malware factories that create SambaCry-like threats that deploy over untraceable networks.

Are You Ready to Handle 100+ Gbps DDoS Attacks—the New Normal?

Article / Jun 13, 2016 (MODIFIED: Jul 6, 2017)

By ilan meller

DDoS attacks have been common since the late 2000s, but average attack peaks have increased to 100+ Gbps.

Thanks to Anonymous’ Latest Toolset, Anyone Can Play the DDoS Game

Article / Jun 1, 2016 (MODIFIED: Jul 6, 2017)

By liron segal

Anonymous commoditizes well-known DDoS attacks by making easy-to-use tools, available to even the most unsophisticated user.

Yasuo-Bot: Flexible, Customized, Fraudulent Content

Report / Dec 14, 2015 (MODIFIED: Jul 6, 2017)

By shaul vilkomir preisman

Standard mobile banking trojans post their own fraudulent content over banking applications. Yasuo-Bot goes further.

Shellshock: Malicious Bash, Obfuscated perlb0t, Echo Probes, and More

Report / Oct 10, 2014 (MODIFIED: Jul 6, 2017)

By maxim zavodchik oz elisyan

Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to Bash.

perlb0t: Still in the Wild with UDP Flood DDoS Attacks

Article / Jul 24, 2014 (MODIFIED: Jul 6, 2017)

By maxim zavodchik

Despite being around since 2005, perlb0t is still being used against unpatched servers.

Follow us on social media.