Last year might be one of the worst year for all of us as coronavirus affected our life in every aspect, but cybercriminals made this year special for themselves as they made big numbers in their history. The year was all filled with cyberattacks either it was tourism industry or it was a cybersecurity company. There were huge leaks of databases by these criminals, there were privacy issues that come into notice, for some it was going absolutely wrong but still, for some it was going alright. When the year was coming to end, we all were excited for the new year, we all were looking for a new and…
UNCONFIGURED REDIS DBMS EXPOSE THOUSANDS OF SERVERS TO MINING TROJANS
HACKERS RUSH IN DEPLOYING MINERS AFTER SURGE IN BITCOIN MARKET VALUE Though banned in many countries, virtual and digital cryptocurrencies have caught many investors’ eyes in the last few days. There is no doubt on this fact that these currencies are not meant for short term profits but its long-term profits are much more valuable than investing in some future goal funds. Thus, for some who already know about it and have invested a lot by taking risks, this investment has turned out to be an ace of spades that has made huge profits for them. Cryptocurrencies are one of the major sources of anonymity by hackers. If we go…
HACKERS CAN USE TELEGRAM TO FIND THE EXACT LOCATION OF YOUR HOME!
Telegram has too introduced a similar feature of People Nearby by enabling which any user can find the nearby persons and start a chat with them. But this feature can pose your privacy too at risk and an attacker can easily be able to see where do you live and what are you doing.
THIS CRYPTO MINING TROJAN HAS INFECTED MORE THAN 15000 SERVERS. IS YOUR NEXT?
Experts have researched a Miner Trojan named TopMiner that uses the methodology of SSH blasting attacks- an attack which results due to weak passwords or vulnerable SSH accounts to get into the servers. After successfully attacking the vulnerable servers with the trojan, malware downloads the SSH blasting program and some other scripts to take-over the root account for the Linux systems with port 22 open available on the network.