Remove Antivirus Remove Cryptocurrency Remove Manufacturing
article thumbnail

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

The Hacker News

Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper functionality as part of a campaign since June 2024.

Antivirus 113
article thumbnail

Vietnam-linked Bismuth APT leverages coin miners to stay under the radar

Security Affairs

Microsoft warns of Vietnam-linked Bismuth group that is deploying cryptocurrency miner while continues its cyberespionage campaigns. Researchers from Microsoft reported that the Vietnam-linked Bismuth group, aka OceanLotus , Cobalt Kitty , or APT32 , is deploying cryptocurrency miners while continues its cyberespionage campaigns.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Defender uses Intel TDT technology against crypto-mining malware

Security Affairs

Microsoft announced an improvement of its Defender antivirus that will leverage Intel’s Threat Detection Technology (TDT) to detect processes associated with crypto-miners. Cryptojacking malware allows threat actors to secretly mine for cryptocurrency abusing computational resources of the infected devices.

article thumbnail

Operation SyncHole: Lazarus APT goes back to the well

SecureList

The campaign, dubbed “Operation SyncHole”, has impacted at least six organizations in South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, and we are confident that many more companies have actually been compromised. The data is sent and received in JSON format.

Malware 144
article thumbnail

Grandoreiro banking malware targets Mexico and Spain

Security Affairs

The campaign began in June 2022 and is still ongoing, the attacks hit organizations in multiple industries, such as Automotive, Chemicals Manufacturing, and others. ” reads the post published by Zscaler. That’s not all. Grandoreiro is a continuously evolving threat that represents a serious threat to organizations worldwide.

Banking 107
article thumbnail

Who’s Behind the GandCrab Ransomware?

Krebs on Security

But GandCrab far eclipsed the success of competing ransomware affiliate programs largely because its authors worked assiduously to update the malware so that it could evade antivirus and other security defenses. in , where the group recruited many of its distributors. “Our name became a generic term for ransomware in the underground.

article thumbnail

Experts hacked 28,000 unsecured printers to raise awareness of printer security issues

Security Affairs

Most of us already know the importance of using antivirus , anti-malware, and VPNs to secure our computers, phones, and other devices against potential attacks. Our selection was based on: Device location (to cover the entire globe) Device manufacturer Protocols used to access the printers. Original post: [link]. Not so much.

Hacking 145