article thumbnail

New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency

The Hacker News

An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new information stealer to hijack the accounts and abuse the systems' resources to mine cryptocurrency. Once infected, S1deload Stealer steals

article thumbnail

VulnRecap 2/19/2024: News from Microsoft, Zoom, SolarWinds

eSecurity Planet

Akira also has potential ties to Conti, another ransomware group, through cryptocurrency transactions, according to Unit 42. Palo Alto’s Unit 42 research team said that Akira led the number of ransomware posts from new leak sites in 2023.

VPN 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ShadowRay Vulnerability: 6 Lessons for AI & Cybersecurity

eSecurity Planet

Hijacked compute: Repurposes expensive AI compute power for attackers’ needs, primarily cryptojacking, which mines for cryptocurrencies on stolen resources. Get the Free Cybersecurity Newsletter Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices.

article thumbnail

Dutch police arrested the author of Dryad and Rubella Macro Builders

Security Affairs

The macro might also purposely attempt to bypass endpoint security defenses. . The police also seized around 20,000 Euro (around $22,000) in cryptocurrency such as Bitcoins. . The Rubella Macro Builder is cheap, fast and easy to use, the malware it generated can evade antivirus detection.

Malware 67
article thumbnail

Vulnerability Recap 4/22/24 – Cisco, Ivanti, Oracle & More

eSecurity Planet

However, most attackers observed exploiting the vulnerability hijacked the workload to mine for cryptocurrency. Consider reading more about container and Kubernetes security tools. The flaws could be used for a variety of exploits, such as using lateral movement to access external resources.

article thumbnail

Who’s Behind the GandCrab Ransomware?

Krebs on Security

But GandCrab far eclipsed the success of competing ransomware affiliate programs largely because its authors worked assiduously to update the malware so that it could evade antivirus and other security defenses. in , where the group recruited many of its distributors.

article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

ECC is used for email encryption, cryptocurrency digital signatures, and internet communication protocols. Get the Free Cybersecurity Newsletter Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices.