web analytics
  • News and Threat Analysis

    NICOMINER GOES WILD, EXPLOITING MULTIPLE VULNERABILITIES TO MINE CRYPTOCURRENCY FROM SYSTEMS

    “NICO JIANG” – FROM A SMALL CRACKING TOOLS’ AUTHOR TO A MINER AUTHOR We all are adapting ourselves to the new normal where virtuality is the only way for authentication. But we can not ignore the fact that cryptocurrency is already known to get authentication without losing your identity. In this currency, authentication is just performed through a digital ledger and the identity of the person is kept anonymous. While some big influencers and celebrities like Elon Musk promote the use of this currency, from some past statistics, it has also been proven to be one of the best ways for the attackers to get paid for their illegal tasks.…

  • News and Threat Analysis,  Tools, Tricks and More

    THE TRANSPARENT BLOCKCHAIN: CATCHING CYBERCRIMINALS FROM THEIR ANONYMOUS WORLD

    We all know that cryptocurrencies are the only way to do anonymous transaction. Either it is FBI or NIA, they find it impossible to track the record of transaction made through cryptocurrency. Every technology geek in today’s time have tried to understand the concept of cryptocurrency due to its growing popularity. In many countries, the cryptocurrency is banned but still it a trending currency in the cyber criminal underground world. But do you wonder what makes it trending in the underground? Well the answer for this question is straightforward. As said above, the cryptocurrency provides a way to cyber criminals to make their transactions absolutely anonymous. What this means is…

  • News and Threat Analysis,  Tools, Tricks and More

    TARGET OF A CRYPTO SCAM? SEE HOW THESE VICTIMS LAUNCHED THEIR OWN SCAM TO COVER LOSSES

    Due to this pandemic, non-contact meetings has become an essential rule all across the world to prevent the spread of COVID-19. Many big corporates and officials are establishing or have established a new normal- work from home to lower their losses and maximize their profit. In the view of this, obviously all paper works are being avoided as much as it can be and are being done digitally. So what about money? Obviously, during these days, digitally money has is a major boost to the economy as it has many advantages and so scams related to this money have also increased. From digital money, many are thinking about debit cards,…

  • News and Threat Analysis

    TELLYOUTHEPASS RANSOMWARE OPERATORS ARE TAKING THE LEGACY OF WANNACRY RANSOMWARE FORWARD

    The most dreadful events of all times in the history of ransomware attacks that actually make youths aware of the fact what actually ransomware is and what amount of damage it cause is the WannaCry ransomware. This attack took place around three years ago and targetted systems which are using windows as their OS. Although, earlier we saw a large number of attacks taking place, but this attack is one of those that is being even remembered by other ransomware operators to launch their campaign. One important fact about this vulnerability is that this attack use Eternal Blue vulnerability to exploit the organization’s intranet and spread the ransomware in every…

  • News and Threat Analysis

    THANATOSCRYPT IS EXPLOITING BLUEKEEP VULNERABILITY TO MINE CRYPTO FROM YOUR SYSTEMS

    Some days before, Ethical Debuggers presented how Chinese hackers are attacking servers to mine cryptocurrency from them. Today, we are presenting a similar campaign ,which is currently going on ,to mine cryptocurrency from your systems . It was found by Tencent Security Intelligence Team. This time the hackers used a simple phenomenon to attack on your systems. They used a Bluekeep vulnerability which was discovered in early May, an year ago. It was a vulnerability in Microsoft’s Desktop Protocol and allows attacker to execute arbitrary code post exploitation. This vulnerability was regarded as one of the high-risk vulnerability and can be tracked via CVE-2019-0708. On 6 September 2019, Metasploit launched…