Remove Adware Remove Cryptocurrency Remove Hacking Remove IoT
article thumbnail

OpenSSH trojan campaign targets Linux systems and IoT devices

Malwarebytes

Poorly configured Linux and Internet of Things (IoT) devices are at risk of compromise from a cryptojacking campaign , according to researchers at Microsoft. The attacks, which involve brute forcing a way into a system, are designed to profit from mining in illicit fashion for cryptocurrency.

IoT 80
article thumbnail

IT threat evolution Q1 2021. Non-mobile statistics

SecureList

For now, we can tentatively assume that the growth in cryptocurrency prices, in particular bitcoin, has attracted the attention of cybercriminals and returned miners to their toolkit. Updated adware for the new Macs also immediately appeared, in particular the Pirrit family (whose members placed high in our Top 20 threats for macOS).

Mobile 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution in Q1 2022. Non-mobile statistics

SecureList

million) including denominated in cryptocurrency; $600,000; 500,000 euros; computer equipment, the crypto wallets that were used to perpetrate crimes, and 20 luxury cars that were purchased with illicitly obtained money.” Adware from the Pirrit family was encountered most frequently out of all macOS threats in the listed countries.

Mobile 113
article thumbnail

IT threat evolution in Q2 2022. Non-mobile statistics

SecureList

For instance, a new APT group Earth Berberoka (GamblingPuppet) that specializes in hacking online casinos, uses malware for Windows, Linux, and macOS. The TraderTraitor campaign targets cryptocurrency and blockchain organizations, attacking with malicious crypto applications for both Windows and macOS. IoT attacks. Verdict. %*.

Mobile 65
article thumbnail

IT threat evolution in Q3 2022. Non-mobile statistics

SecureList

LockBit themselves attributed the leakage to one of their developers’ personal initiative, not the group’s getting hacked. In particular, researchers found Operation In(ter)ception , a campaign operated by North Korean Lazarus group, which targets macOS users looking for cryptocurrency jobs. IoT attacks.

Mobile 96
article thumbnail

Kaspersky Security Bulletin 2020-2021. EU statistics

SecureList

IoT attacks. IoT threat statistics. The share of malware type in the total number of malicious programs downloaded to IoT devices following a successful attack. Cybercriminals create such sites on purpose, and web resources with user-created content (for example, forums), as well as hacked legitimate resources, can be infected.

Phishing 138