Cryptominers

Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks

Every single day, hundreds of thousands of internet users are victims of some form of cyberattack. The number of hackers… Read More

2 years ago

Popular nmp package hijacked, modified to deliver cryptominers

Several versions of the npm package for UA-parser.js, a widely used JavaScript library, have been modified to include malicious code… Read More

3 years ago

Malicious Packages Disguised as JavaScript Libraries Found

Researchers at open-source software firm Sonatype have uncovered multiple malicious packages that disguise themselves as legitimate JavaScript libraries on npm… Read More

3 years ago

Malicious Docker Images Used to Mine Monero

A recently uncovered cryptomining scheme used malicious Docker images to hijack organizations’ computing resources to mine cryptocurrency, according to cybersecurity… Read More

3 years ago

Malicious Cryptominers Target Software Repositories to Burn a Hole in Your Wallet

Sonatype researchers have recently discovered malicious packages in PyPI, a software code repository, that turns developers’ workstations into cryptomining machines.… Read More

3 years ago