FutureFive New Zealand logo
Consumer technology news from the future

Cryptomining news stories

Story image
Cryptocurrency
Crypto app downloads down as market crashes - report
It appears the mass FOMO around crypto investing may be wearing thin with new data revealing a noticeable drop in crypto app downloads this year.
Story image
Ransomware
New threat intelligence from Sophos following the Apache Log4Shell vulnerability
Sophos has provided new threat intelligence following the reporting of the Apache Log4Shell vulnerability.
Story image
Malware
Sophos uncovers new variants of Tor2Mine cryptominer
Sophos has released new findings on the Tor2Mine cryptominer that show how the miner evades detection, spreads automatically through a target network, and is increasingly harder to remove from an infected system.
Story image
Sophos
Malicious cryptominer exploits MS Exchange Server vulnerabilities
"We are looking at yet another rapidly compiled, opportunistic and possibly experimental attack."
Story image
Cybersecurity
How Bitcoin could impact the cyber-threat landscape
Bitcoin's escalating valuation has made some criminal organisations and malicious individuals very wealthy. The impact of this growth in wealth may have a severe impact on the future threat landscape.
Story image
Cybersecurity
Sophos unearths origin of prominent cryptominer
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
Story image
Cybersecurity
SMBs in SEA region threatened by vastly increasing rates of cryptomining
According to Kaspersky's latest report, the global cybersecurity company has detected 1,726,799 mining attempts in the first half of this year targeting SMBs in SEA.
Story image
Cryptocurrency
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Story image
Cybersecurity
Microsoft takes down malicious botnet after years of tracking
The botnet, called Necurs, gained control of the computers using malware and used them to commit crimes remotely.
Story image
Cloud Security
Check Point report highlights latest cyber-threats worldwide
28% of all organisations worldwide were impacted by malicious multi-purpose botnets, while the rise of 20% of incident response cases were targeted ransomware attack.
Story image
Carbon Black
Carbon Black discovers evolution of popular cryptomining campaign
Attackers could theoretically pull in an estimated $1.6 million annually by leveraging this attack model, which began about two years ago.
Story image
Malware
Five tips to defend against cryptojacking - Bitglass
The incidence of cryptojacking has seen rapid growth and has emerged as a favourite strategy for hackers.
Story image
Malware
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Story image
Multi-factor authentication / MFA
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Story image
Cloud
Ransomware attacks on the rise again - Malwarebytes
The report found that ransomware is seeing a 325% increase from previous year, and is the fourth-most detected threat against businesses in APAC.
Story image
Cybersecurity
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Story image
Cybersecurity
Survey shows organisations in the dark about shadow mining threat
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Story image
Microsoft
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Story image
Ransomware
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
Story image
Check Point
Check Point names February’s most disruptive malware
Check Point’s researchers confirm Coinhive holds the top position in February's Top Malware index for fifteenth successive month before it shut down, while GandCrab distribution campaigns increase.
Story image
Cybercrime
Cybercriminals earning over $3billion annually exploiting social platforms
Social media platforms contain up to 20% more methods by which malware can be delivered to users – e.g. through adverts, shares, plug-ins – than comparable sources.
Story image
IBM Security
IBM Security: Cybercriminals focusing on cryptojacking
The report found that more than half of cybercriminal attacks pivot away from malware-based attacks.
Story image
Cloud Security
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Story image
Cloud
Cybercrime tools and services becoming increasingly democratised
Findings from Check Point's new report reveal a concerning trend as cybercrime grows increasingly well-managed and accessible.