Cryptocurrency Blog News(60) - 2024 2023 2022 2021 2020 2019 2018
AI blog APT blog Attack blog BigBrother blog BotNet blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog ICS blog Incident blog IoT blog Malware blog OS Blog Phishing blog Ransom blog Safety blog Security blog Social blog Spam blog Vulnerebility blog 2024 2023
DATE | NAME | Info | CATEG. | WEB |
2.11.24 | Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach | In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. | Cryptocurrency blog | |
28.9.24 | Wallet Scam: A Case Study in Crypto Drainer Tactics | Check Point Research (CPR) uncovered a malicious app on Google Play designed to steal cryptocurrency marking the first time a drainer has targeted mobile device users exclusively. The app used a set of evasion techniques to avoid detection and remained available for nearly five months before being removed. | Cryptocurrency blog | Checkpoint |
20.7.24 | An In-Depth Look at Crypto-Crime in 2023 Part 2 | In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. | Cryptocurrency blog | Trend Micro |
13.7.24 | An In-Depth Look at Crypto-Crime in 2023 Part 2 | In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. | Cryptocurrency blog | Trend Micro |
13.7.24 | An In-Depth Look at Crypto-Crime in 2023 Part 1 | Cybersecurity is a growing concern in today's digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals and businesses. | Cryptocurrency blog | Trend Micro |
13.7.24 | How do cryptocurrency drainer phishing scams work? | In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials. | Cryptocurrency blog | Cisco Blog |
6.7.24 | Turning Jenkins Into a Cryptomining Machine From an Attacker's Perspective | In this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly. | Cryptocurrency blog | Trend Micro |
29.6.24 | Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer | We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. | Cryptocurrency blog | Trend Micro |
29.6.24 | We’re not talking about cryptocurrency as much as we used to, but there are still plenty of scammers out there | A report in March found that 72% of cryptocurrency projects had died since 2020, with crypto trading platform FTX’s downfall taking out many of them in one fell swoop. | Cryptocurrency blog | Cisco Blog |
18.5.24 | Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain | One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft | Cryptocurrency blog | Eset |
20.4.24 | Bitcoin scams, hacks and heists – and how to avoid them | Here’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safe | Cryptocurrency blog | Eset |
23.3.24 | ETHEREUM’S CREATE2: A DOUBLE-EDGED SWORD IN BLOCKCHAIN SECURITY | Ethereum’s CREATE2 function is being exploited by attackers to compromise the security of digital wallets, bypassing traditional security measures and facilitating unauthorized access to funds. | Cryptocurrency blog | Checkpoint |
14.1.24 | Lessons from SEC's X account hack – Week in security with Tony Anscombe | The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFs | Cryptocurrency blog | Eset |