Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
4 résultats taggé Cryptojacking  ✕
Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
02/09/2024 18:37:02
QRCode
archive.org
thumbnail

We provide a technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.

trendmicro EN 2024 Cryptojacking via CVE-2023-22527 Atlassian Confluence analysis
Cryptojacking: Understanding and defending against cloud compute resource abuse https://www.microsoft.com/en-us/security/blog/2023/07/25/cryptojacking-understanding-and-defending-against-cloud-compute-resource-abuse/
26/07/2023 13:19:50
QRCode
archive.org
thumbnail

Cloud cryptojacking, a type of cyberattack that uses computing power to mine cryptocurrency, could result in financial loss to targeted organizations due to the compute fees that can be incurred from the abuse.

microsoft en 2023 report cryptojacking cloud defending
Beware of macOS cryptojacking malware. https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/
24/02/2023 23:10:33
QRCode
archive.org
thumbnail

You may have heard about the cryptojacking malware on macOS. Read about a new one spotted by Jamf Threat Labs.

jamf EN 2023 macOS cryptojacking malware
New Kiss-a-dog Cryptojacking Campaign Targets Docker and Kubernetes https://www.crowdstrike.com/blog/new-kiss-a-dog-cryptojacking-campaign-targets-docker-and-kubernetes/
22/12/2022 10:08:41
QRCode
archive.org
thumbnail

CrowdStrike has uncovered a new cryptojacking campaign targeting vulnerable Docker and Kubernetes infrastructure using an obscure domain from the payload, container escape attempt and anonymized “dog” mining pools.

Called “Kiss-a-dog,” the campaign used multiple command-and-control (C2) servers to launch attacks that attempted to mine cryptocurrency, utilize user and kernel mode rootkits to hide the activity, backdoor compromised containers, move laterally in the network and gain persistence. 

The CrowdStrike Falcon® platform helps protect organizations of all sizes from sophisticated breaches, including cryptojacking campaigns such as this. 

crowdstrike EN 2022 Kiss-a-dog Cryptojacking docker kubernetes
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio