Cryptominers Found in Audio Files Researchers have recently found that both cryptominers and backdoors are being deployed within WAV audio files on targeted systems. Using steganography, attackers can include components for both loading and executing malicious scripts, while still allowing some audio files to play normally. Along with the malicious software, Monero cryptominers were launched […]
Second Florida City Pays Ransom Following the news that Riviera Beach, FL would pay the ransom demanded by cyberattackers, the mayor of Lake City, FL has announced that the city will be paying the demanded ransom of $460,000 to restore access to their email and internal system servers. While law enforcement agencies strongly recommend against […]
The post Cyber News Rundown: Second Florida Ransomware Attack appeared first on Webroot Blog.
Reading Time: ~2 min.Banking Trojan Shuts Down Ohio School District After the discovery of the banking Trojan known as Trickbot, an Ohio school district was forced to cancel school since they were unable to fully disinfect the networks before classes resumed the following Monday. Preliminary reports have concluded that no students were responsible for the attack, as it […]
The post Cyber News Rundown: Banking Trojan Closes Ohio Schools appeared first on Webroot Blog.
Reading Time: ~2 min.WhatsApp Exploited to Install Spyware through Calls A serious flaw has been discovered in the messaging app WhatsApp that would allow an attacker to install spyware on a victim’s device by manipulating the packets being sent during the call. Further disguising the attack, the malicious software could be installed without the victim answering the call, […]
The post Cyber News Rundown: WhatsApp Vulnerability Could Install Spyware appeared first on Webroot Blog.
Reading Time: ~2 min.Hackers Breach Private Keys to Steal Cryptocurrency A possible coding error allowed hackers to compromise at least 732 unique, improperly secured private keys used in the Ethereum blockchain. By exploiting a vulnerability, hackers have successfully stolen 38,000 Ethereum coins so far, translating to over $54 million in stolen funds, though the current number is likely […]
Reading Time: ~2 min.Anatova Ransomware Reaches Global Market A new ransomware family, dubbed Anatova by researchers, has been infecting machines across the globe. During encryption, Anatova appears to focus on small files to speed up overall encryption times, but doesn’t append the encrypted files with a new extension. Unexpectedly, this variant demands DASH crypto coins, rather than using […]
The post Cyber News Rundown: Anatova Ransomware Infects the Globe appeared first on Webroot Blog.
Reading Time: ~5 min.The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for. Continued Growth of Cryptojacking Cryptojacking will continue […]
Reading Time: ~2 min.Cryptojacking “Game” Found on Steam Store Valve has taken recent action against an indie-developed game available on Steam, the company’s game/app store, and removed their listing after many customers had complained about cryptomining slowing their systems, once launched. Additionally, the developers have been caught selling in-game items on third-party sites, that were falsely portrayed as […]
The post Cyber News Rundown: Valve Bans Developer for Cryptojacking appeared first on Webroot Blog.
Reading Time: ~6 min.Cybercriminals are constantly experimenting with new ways to take money from their victims. Their tactics evolve quickly to maximize returns and minimize risk. The emergence of cryptocurrency has opened up new opportunities to do just that. To better understand today’s threat landscape, it’s worth exploring the origins of cryptocurrencies and the progress cybercriminals have made […]