article thumbnail

The BlueNoroff cryptocurrency hunt is still on

SecureList

Also, we have previously reported on cryptocurrency-focused BlueNoroff attacks. It appears that BlueNoroff shifted focus from hitting banks and SWIFT-connected servers to solely cryptocurrency businesses as the main source of the group’s illegal income. Instead, they can rely on regular macro-enabled documents or older exploits.

article thumbnail

500M Avira Antivirus Users Introduced to Cryptomining

Krebs on Security

In 2017, the identity theft protection company LifeLock was acquired by Symantec Corp. For example, it doesn’t specify how much NortonLifeLock gets out of the deal (NortonLifeLock keeps 15 percent of any cryptocurrency mined by Norton Crypto). Avira Free Antivirus). In January 2021, Avira was acquired by Tempe, Ariz.-based

Antivirus 353
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

Norton 360 , one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. In 2017, the identity theft protection company LifeLock was acquired by Symantec Corp. Transaction fees fluctuate due to cryptocurrency market conditions and other factors.

article thumbnail

Malicious Use of Internet Information Services (IIS) Extensions Likely to Grow

Security Boulevard

Exploit Tools and Targets: Malicious Use of Internet Information Services (IIS) Extension. Microsoft published a report on July 26th alerting defenders to the malicious use of Internet Information Services (IIS) extensions. based hospitals. 2 , 3 ) In late July, the U.S. 5 ) More recently, the U.S.

article thumbnail

PurpleFox malware infected at least 2,000 computers in Ukraine

Security Affairs

. “As part of a detailed study of the cyber threat, a study of the received samples of malicious programs was conducted, the peculiarities of the functioning of the management server infrastructure were established, and more than 2,000 affected computers were identified in the Ukrainian segment of the Internet.”

Malware 99
article thumbnail

Cryptocurrency – are you ready for next big hack?

Thales Cloud Protection & Licensing

A few years ago, the term cryptocurrency was only used among the tech elite and the only type available for purchase was Bitcoin. Fast forward to 2018 when the average consumer is able to invest and has a pick of over 1,800 different kinds of cryptocurrencies to choose from. dollars via crypto hacks and scams.

article thumbnail

Supply Chain Cyberattacks Surged 200% in 2017

Dark Reading

Symantec's annual Internet Security Threat Report also shows that zero-day exploits fizzled and cryptocurrency mining exploded.