Hackers Abused Oracle WebLogic Server for Mining Cryptocurrencies
There is a rapid growth in cryptocurrency attacks from the mid of 2017, mining cryptocurrency requires more computing power, which requires significant amounts of energy. Attackers abuses Oracle WebLogic Server vulnerability to deliver Monero Miner Payloads.
As long as your...
Hackers Illegally Purchasing Abused Code-signing & SSL Certificates From Underground Market
Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads.
Abused Codesigning certificates would provide integrity for an application and there are different classes of Codesigning certificates standard and Extended Validation.
Cybercriminals obtaining...
Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website
Cryptojacking Malware called "Minr" infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR).
Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious...
Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents
Microsoft word documents abused by Cryptocurrency Mining script embedded phishing Videos and victims tricked into watching an "innocent" video that leads to performing a crypto-Jacking Attack on victims PC.
Nowadays Hackers always finding a new malicious way to mining Cryptocurrency by abusing...
Cryptojacking Attack – Tesla Internal Servers Hacked to Mine Cryptocurrency
Tesla internal servers compromised by hackers and exposed the sensitive data from Tesla’s Kubernetes console that has been used for performing the cryptojacking attack.
Kubernetes is an open-source application used by large companies to manage API and server infrastructure and a...