Malware News

Malicious software, or malware, is a piece software made to damage a computer or a network. Malware operates from within the targeted system and needs to be implanted into it before the execution of its program. Trojan malware is one of the most popular damaging tools, which is usually executed by the misled user themself. An executed trojan can offer hackers the opportunity to access a user’s private information, install some mining malware or encryption malware without the target’s knowledge about it. Malware can be used for various purposes, such as to damage system maintenance, or to gain access to trade secrets or to secret government information. Bitcoin-stealing malware and other cryptocurrency-targeted programs are also widely used alongside the malware for stealing fiat money. The problem of malware for businesses and users becomes more concerning with the growing speed of IT-implementation into daily life.
News
Interpol helped curtail cryptojacking malware that affected thousands of routers.
Interpol Collaborates With Cybersecurity Firm to Tackle Cryptojacking
Andrey Shevchenko
2020-01-09T13:42:00+00:00
1821
News
‘Shitcoin Wallet,’ an Ethereum wallet available as a Chrome Browser extension, is injecting malicious javascript to steal user’s data.
Chrome Browser Extension Ethereum Wallet Injects Malicious JavaScript To Steal Data
Rachel Wolfson
2019-12-31T21:18:00+00:00
9860
News
Researchers have published a new report on what they say is a “relentless” crypto mining botnet that lurks behind seemingly innocuous content like JPEG images o...
Monero Malware Botnet Lurks Behind Taylor Swift JPEGs
Marie Huillet
2019-12-19T13:45:00+00:00
3900
News
Security researchers have discovered a new cryptocurrency-related macOS malware believed to be developed by North Korean hackers at the Lazarus Group.
Researchers Detect New North Korea-Linked MacOS Malware on Crypto Trading Site
Ana Alexandre
2019-12-04T16:25:00+00:00
3667
News
Security researchers have uncovered a vulnerability that could allow hackers to access private data on any Android phone, including login credentials to crypto ...
Report: Android Vulnerability Allows Hackers to Steal Crypto Wallet Info
Joeri Cant
2019-12-03T21:38:00+00:00
6981
News
Launched on Nov. 24, a new cryptojacking campaign uses Docker platforms that have API endpoints exposed online to mine XMR.
Hackers Mass-Scanning Web for Docker Platforms to Mine Cryptocurrencies
Helen Partz
2019-11-27T18:58:00+00:00
4225
News
Major antivirus software supplier Eset has found cyber criminals using YouTube to distribute mining modules to cryptojack Monero.
Report: Cyber Criminals Are Using YouTube To Install Cryptojacking Malware
Joeri Cant
2019-11-27T02:00:00+00:00
26716
News
Microsoft security analysts reveal that cryptocurrency-stealing malware “Dexphot” already infected 80,000 computers earlier this year.
New Crypto-Stealing Malware Infected 80,000 Computers, Microsoft Says
Joeri Cant
2019-11-26T20:01:00+00:00
7795

Follow us on Facebook