Remove 2018 Remove Cryptocurrency Remove Hacking Remove IoT
article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting IoT devices and how? The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved.

IoT 82
article thumbnail

2018 Top Cybersecurity Threats

NopSec

This year, NopSec did just that with our 2018 Top Cybersecurity Threats White paper , and we predict that the biggest cyber threats will be massive data breaches, ransomware, opportunistic crypto-mining attacks and IoT hacking. Ransomware Ransomware dominated the news cycles in 2017 and we don’t expect that to change in 2018.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Torii botnet, probably the most sophisticated IoT botnet of ever

Security Affairs

Avast spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously analyzed. Security researchers spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously analyzed. Pierluigi Paganini.

IoT 87
article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. The messages said recipients had earned an investment credit at a cryptocurrency trading platform called moonxtrade[.]com. In May 2020, Zipper told another Lolzteam member that quot[.]pw

Scams 247
article thumbnail

Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild

Security Affairs

According to the threat intelligence firm Volexity, the CVE-2018-11776 vulnerability is already being abused in malicious attacks in the wild. Just yesterday I wrote about the availability online of the exploit code for the recently discovered Critical remote code execution vulnerability CVE-2018-11776 in Apache Struts 2.

article thumbnail

Microsoft releases open-source tool for checking MikroTik Routers compromise

Security Affairs

We published this tool to help customers ensure these IoT devices are not susceptible to these attacks.” The news wave of attacks aimed at cryptocurrency firms, most of them located in the U.S. SecurityAffairs – hacking, RouterOS Scanner). ” reads the post published by Microsoft. Pierluigi Paganini.

Malware 128
article thumbnail

Other 3,700 MikroTik Routers compromised in cryptoJacking campaigns

Security Affairs

Thousands of unpatched MikroTik Routers are involved in new cryptocurrency mining campaigns. The exploit code for the CVE-2018-14847 vulnerabilities is becoming a commodity in the hacking underground, just after its disclosure crooks started using it to compromise MikroTik routers. Summarizing, more than 370,000 of 1.2