Cryptocurrency Blog News(60)  - 2024  2023  2022  2021  2020  2019  2018

AI blog  APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog  2024  2023

DATE

NAME

Info

CATEG.

WEB

2.11.24

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. Cryptocurrency blog

Trend Micro

28.9.24

Wallet Scam: A Case Study in Crypto Drainer TacticsCheck Point Research (CPR) uncovered a malicious app on Google Play designed to steal cryptocurrency marking the first time a drainer has targeted mobile device users exclusively. The app used a set of evasion techniques to avoid detection and remained available for nearly five months before being removed.Cryptocurrency blogCheckpoint

20.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 2In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise.Cryptocurrency blogTrend Micro

13.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 2In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. Cryptocurrency blogTrend Micro

13.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 1Cybersecurity is a growing concern in today's digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals and businesses. Cryptocurrency blogTrend Micro

13.7.24

How do cryptocurrency drainer phishing scams work?In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials.Cryptocurrency blogCisco Blog

6.7.24

Turning Jenkins Into a Cryptomining Machine From an Attacker's PerspectiveIn this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly.Cryptocurrency blogTrend Micro
29.6.24Examining Water Sigbin's Infection Routine Leading to an XMRig CryptominerWe analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. Cryptocurrency blogTrend Micro
29.6.24We’re not talking about cryptocurrency as much as we used to, but there are still plenty of scammers out thereA report in March found that 72% of cryptocurrency projects had died since 2020, with crypto trading platform FTX’s downfall taking out many of them in one fell swoop.Cryptocurrency blogCisco Blog

18.5.24

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gainOne of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theftCryptocurrency blogEset
20.4.24Bitcoin scams, hacks and heists – and how to avoid themHere’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safeCryptocurrency blogEset
23.3.24ETHEREUM’S CREATE2: A DOUBLE-EDGED SWORD IN BLOCKCHAIN SECURITYEthereum’s CREATE2 function is being exploited by attackers to compromise the security of digital wallets, bypassing traditional security measures and facilitating unauthorized access to funds.Cryptocurrency blogCheckpoint

14.1.24

Lessons from SEC's X account hack – Week in security with Tony AnscombeThe cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFsCryptocurrency blogEset