Cryptocurrency miners are seemingly working away under every rock on the internet and there is good reason. It's an almost guaranteed payday with a negligible chance of being discovered.
Threat actors exploited the CVE-2017-10271 vulnerability which allows for remote code execution to deliver both a 64-bit variant and a 32-bit variant of an XMRig Monero miner, according to a 26 February blog post.
One of the biggest cryptomining operations ever discovered is targeting Jenkins CI servers, the most popular open source automation server in use today, causing slower performance and even denial of service attacks.
A malicious campaign that's been exploiting a vulnerability in Oracle's WebLogic application servers in order to install a Monero cryptominer on victims' machines spreads the threat worldwide, across virtually all industry sectors.
The new Monero miner Smominru is active in the wild using the EternalBlue exploit to spread, according to a new report.
Security researchers recently observed an unknown threat actor attempting to deploy a Monero cryptocurrency miner software to users' systems by leveraging Kaseya Ltd's Virtual Systems Administrator (VSA).
A newly discovered malicious URL redirection campaign that infects users with the XMRig Monero cryptocurrency miner has already victimised users between 15 and 30 million times, researchers have reported.
Cryptocurrency miners have begun using two older and already patched vulnerabilities to compromise servers to mine the Monero digital currency.
In addition to hiding cryptocurrency miners in the coding of websites, malicious actors may also increasingly conceal them within advertisements appearing on these sites.
Hackers have deployed brute force attacks on WordPress websites in order to turn them into cryptocurrency miners. Single botnet thought to be behind massive attack that yielded almost £750,000 for criminals.
Facebook Messenger is the launching pad for a new Monero-cryptocurrency mining bot called Digmine that so far is hitting only a small sampling of nations around the world.
Zealot campaign used Eternalblue and Eternalsynergy to mine Monero cryptocurrency on networks.
Researchers from Zscaler's ThreatLabZ division on Friday released an analysis report on two relatively new open-source ransomware programs, Bugware and Vortex, after tracking recent spam campaigns pushing the strains.
A new drive-by cryptominer is using a unique technique which allows malicious site owners and threat actors to keep mining Monero even after closing their browser windows.
Crypto-currency mining malware is back, driven in part by the growing popularity of alternatives to Bitcoin that are easier to mine and the increasing power of GPUs.