Friday, August 9, 2019
Oracle WebLogic Server

Hackers Abused Oracle WebLogic Server for Mining Cryptocurrencies

There is a rapid growth in cryptocurrency attacks from the mid of 2017, mining cryptocurrency requires more computing power, which requires significant amounts of energy. Attackers abuses Oracle WebLogic Server vulnerability to deliver Monero Miner Payloads. As long as your...
Abused Code-signing

Hackers Illegally Purchasing Abused Code-signing & SSL Certificates From Underground Market

Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning certificates would provide integrity for an application and there are different classes of Codesigning certificates standard and Extended Validation. Cybercriminals obtaining...
Cryptojacking

Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Cryptojacking Malware called "Minr" infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR). Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious...
Cryptocurrency Mining script

Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents

Microsoft word documents abused by Cryptocurrency Mining script embedded phishing Videos and victims tricked into watching an "innocent" video that leads to performing a crypto-Jacking Attack on victims PC. Nowadays Hackers always finding a new malicious way to mining Cryptocurrency by abusing...

Cryptojacking Attack – Tesla Internal Servers Hacked to Mine Cryptocurrency

Tesla internal servers compromised by hackers and exposed the sensitive data from Tesla’s Kubernetes console that has been used for performing the cryptojacking attack. Kubernetes is an open-source application used by large companies to manage API and server infrastructure and a...
ethicalhackersacademy