crypto

Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building large scale botnets. The Dofloo (aka AESDDoS) malware was first detected in 2014 [1, 2, 3, 4] and it is known for allowingRead More →

cryptocurrency

Base layer protocols: Base layer protocols are the peer-to-peer networks which form the basis of the Decentralized application (dApp) web. These base protocols are typically blockchains with an associated cryptocurrency coin secured by a consensus protocol where participants in the network decide collectively on the addition of new blocks toRead More →

crypto

The researchers at a Israeli Cybersecurity firm recently found that Kingminer, a cryptojacking  malware is constantly upgrading it’s system to escape detection and increase chance of success. It will continue to update which will invariably make detection tougher. The malware’s prey are servers developed by Microsoft especially Internet Information ServicesRead More →

crypto

Cryptojacking schemes are getting more and more intricate by the day. It appears hackers are now disguising cryptocurrency mining malware and passing it off as legitimate Windows installation packages. Researchers say the malicious code, more commonly known as Coinminer, was specifically designed to fly under the radar. What makes theRead More →