article thumbnail

Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign

Security Affairs

Threat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part of a cryptocurrency campaign. The tool is not designed to be exposed on the Internet, however, researchers spotted tens thousands Redis instance publicly accessible without authentication. ” warns Censys. bash_history).

article thumbnail

The BlueNoroff cryptocurrency hunt is still on

SecureList

Also, we have previously reported on cryptocurrency-focused BlueNoroff attacks. It appears that BlueNoroff shifted focus from hitting banks and SWIFT-connected servers to solely cryptocurrency businesses as the main source of the group’s illegal income. Malware infection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Xwo Malware scans the Internet for Exposed Services, Default Passwords

Security Affairs

Researchers at AT&T Alien Labs have spotted a malware called Xwo that is actively scanning the Internet for exposed web services and default passwords. Experts at AT&T Alien Labs discovered a new piece of malware called Xwo that is actively scanning the Internet for exposed web services and default passwords. Www backup paths.

article thumbnail

REvil Ransomware Gang Starts Auctioning Victim Data

Krebs on Security

“Others have gotten the message about the need for good backups, and probably don’t need to pay. A report published in mid-April by cryptocurrency research firm Chainalysis found that ransomware payments “have decreased significantly since the COVID-19 crisis intensified in the U.S. and Europe in early March.”

article thumbnail

Ransomware making big money through "big game hunting"

Malwarebytes

Chainalysis, a blockchain research firm, looked at data from monitored cryptocurrency wallets, concluding that around $449 million has been taken from victims in the last six months. It’s not all doom and gloom where cryptocurrency payments are concerned. Create offsite, offline backups. Detect intrusions.

article thumbnail

A history of ransomware: How did it get this far?

Malwarebytes

But what really requires a high speed internet connection is the large amounts of data that ransomware gangs steal from affected networks to add extra leverage to their ransom demands. The use of cryptocurrency allows cybercriminals to transfer their funds to a place where they feel they can safely use it. Prevent intrusions.

article thumbnail

DoppelPaymer ransomware group suspects identified

Malwarebytes

Cryptocurrency investigators use specialized strategies to track down criminals. Although cryptocurrency is anonymous, that doesn't mean it's untraceable. Create a plan for patching vulnerabilities in internet-facing systems quickly; and disable or harden remote access like RDP and VPNs. Create offsite, offline backups.