Hackers exploited a critical vulnerability in the Java-based Apache Log4j logging library to install hidden miners and other malware. An exploit called Log4Shell allowed attackers to download Mirai and Muhstik malware onto devices. Later they were used to launch Kinsing cryptominers, organize...
Specialists from Cisco Talos have found the Prometei botnet, which used computer systems to extract Monero (XMR). It was reported in the company's blog. Prometei is capable of disabling security controls, copying files, and disguising itself as other programs to set up illegal mining operations....
Microsoft's cyber threat investigation team discovered malware for hidden mining in a desktop wallpaper featuring basketball player Kobe Bryant who died last week in a plane crash. While the world mourns the loss of an NBA legend, cybercriminals are, as expected, taking advantage of the tragedy. We...
Ukrainian cyber police detained a 20-year-old student from Odesa on suspicion of hidden crypto mining. This was reported on the official website of the department. “Having received a technical education, the young man used the acquired knowledge to commit illegal actions. As a member of hacker...
See all cryptocurrency and blockchain news and articles on "hidden mining"
Blockchaintd.com uses Cookies to ensure the best experience for you.