EHA
Kinsing Malware Targets Kubernetes

Kinsing Malware Uses Unique Techniques to Breach Kubernetes Clusters

By exploiting vulnerabilities in container images and misconfigured PostgreSQL containers, Kinsing malware is now actively infiltrating Kubernetes clusters. Threat actors are not unusual in using these tactics, but it appears that the past week has...
Are Crypto Trading Bots Safe To Use?

Are Crypto Trading Bots Safe To Use?

Crypto trading bots have become very popular lately. Despite their popularity, though, there is also a growing concern about their safety. Many people are wary about losing their hard-earned money to crypto bots, which...
BlueNoroff Hacker Group Attack Small & Medium-Sized Cryptocurrency Companies

BlueNoroff Hacker Group Attack Small & Medium-Sized Cryptocurrency Companies

A North Korean-based hacker group which is tracked as "BlueNoroff Hacker Group" was identified to be targeting the small and medium-sized cryptocurrency companies with fake MetaMask browser extensions and malicious documents. The BlueNoroff Hacker Group...
Cryptomining Malware

Cryptomining Malware Uses New Techniques To Hide The Attack & Bypass Security

The Team Nautilus security analysts at Aqua Security has recently caught an ongoing malicious cryptomining campaign that has upgraded to the next level while evolving its new TTPs like:-  Defense mechanismsuch malicious malware and campaignsEvasion...
New NPM Malware Mines Cryptocurrency on Windows, Linux, macOS Devices

New NPM Malware Mines Cryptocurrency on Windows, Linux, macOS Devices

The automated malware detection system of Sonatype has recently discovered several malicious cryptocurrency mining software on Windows, Linux, macOS Devices.  All these cryptocurrency mining software were disguised themselves as legitimate JavaScript libraries, and found in...
Cryptojacking Attacks Are on the Rise: How Can You Stay Safe?

Cryptojacking Attacks Are on the Rise: How Can You Stay Safe?

Living in a digital age where many transactions occur online can be both a blessing and curse. Unfortunately, the increased popularity of cryptocurrency comes with the risk of cryptojacking. Most hackers who perform cryptojacking...
Cryptocurrency Hack

Cryptocurrency Hack – Attackers Stole $611 Million In One Of The Biggest Crypto Heist

PolyNetwork, a protocol that allows users to conduct business across blockchains suffers a security breach, where attackers stole more than $600 million in cryptocurrencies. Blockchains are decentralized ledgers that ease transactions among users without the...
Romanian Hackers Actively Attacking Linux-based Machines With Weak SSH Credentials

Romanian Hackers Actively Attacking Linux-based Machines With Weak SSH Credentials

Researchers uncovered a new active crypto-jacking attack from the APT threat group targeting Linux-based machines by taking advantage of the weak SSH credentials to deploy the crypto-malware to mine Monero cryptocurrency. To mine cryptocurrency, attackers...
Crackonosh Malware

222,000 Computers Worldwide Hacked To Mine Monero Cryptocurrency

Researchers from Avast say the “Crackonosh” malware has been living in the 222,000 computers worldwide, which have installed the cracked version of the games from Torrent. Some of them are “Grand Theft Auto V”...
Cybercriminals Running Contest

Cybercriminals Running Contest – $115,000-Prize for New Cryptocurrency Hacks

In the 2021 RSA conference, the best cybersecurity industry came together to present numerous ideas on how to stop cybercriminals from carrying out their crimes. At the other end, the cybercriminals were holding their...