Remove Cryptocurrency Remove Hacking Remove Information Security Remove Passwords
article thumbnail

Crooks hacked Mandiant X account to push cryptocurrency scam

Security Affairs

The X account of cybersecurity giant Mandiant was hacked, attackers used it to impersonate the Phantom crypto wallet and push a cryptocurrency scam. Crooks hacked the X account of cybersecurity firm Mandiant and used it to impersonate the Phantom crypto platform and share a cryptocurrency scam.

Scams 106
article thumbnail

Crooks broke into AT&T email accounts to empty their cryptocurrency wallets

Security Affairs

Threat actors are gaining access to AT&T email accounts in an attempt to hack into the victim’s cryptocurrency exchange accounts. Hackers are breaking into the AT&T email accounts and then using the access they are logging into the victim’s cryptocurrency exchange accounts to drain their crypto funds, TechCrunch reported.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Highly evasive cryptocurrency miner targets macOS

Security Affairs

Trojanized versions of legitimate applications are being used to deploy XMRig cryptocurrency miner on macOS systems. Later first generation samples changed to a user Launch Agent, which would not require the conspicuous password prompt. ” reads the analysis published by the experts. ” concludes the report.

article thumbnail

Tainted password-cracking software for industrial systems used to spread P2P Sality bot

Security Affairs

Threat actors behind the campaign used multiple accounts across several social media platforms to advertise password-cracking software for Programmable Logic Controller (PLC), Human-Machine Interface (HMI), and project files. The password cracking software also acts as a dropper for the Sality P2P bot. ” concludes the report.

Passwords 112
article thumbnail

New Windows Meduza Stealer targets tens of crypto wallets and password managers

Security Affairs

The malware also targets crypto wallet extensions, password managers, and 2FA extensions. The malware also collects a variety of data, including system info, browser info, password manager info, miner related registry info, and installed games info. The malware admin declared that their operations do not involve any ransom activities.

article thumbnail

WeSteal, a shameless commodity cryptocurrency stealer available for sale

Security Affairs

The bold author of a new cryptocurrency stealer, dubbed WeSteal, is promising its customers a leading way to make money in 2021. According to Palo Alto Networks, the author of WeSteal, that goes online as “ComplexCodes,” started advertising the cryptocurrency stealer on underground forums in mid-February 2021. Pierluigi Paganini.

article thumbnail

Monero Cryptocurrency campaign exploits ProxyLogon flaws

Security Affairs

Threat actors targeted are exploiting the ProxyLogon vulnerabilities in Microsoft Exchange servers to deploy Monero cryptocurrency miners. The miner’s pools.txt file is temporarily written to disk, its analysis allowed the researchers to determine the wallet address and its password, and the name DRUGS assigned to the pool of miners.