HACKERS RUSH IN DEPLOYING MINERS AFTER SURGE IN BITCOIN MARKET VALUE Though banned in many countries, virtual and digital cryptocurrencies have caught many investors’ eyes in the last few days. There is no doubt on this fact that these currencies are not meant for short term profits but its long-term profits are much more valuable than investing in some future goal funds. Thus, for some who already know about it and have invested a lot by taking risks, this investment has turned out to be an ace of spades that has made huge profits for them. Cryptocurrencies are one of the major sources of anonymity by hackers. If we go…
-
-
THIS NEW VARIANT OF MYKINGS BOTNET IS SUPPORTED BY PCSHARE TROJAN TO MAKE YOUR SYSTEM A SLAVE!
All the creatures around us are either masters who control slaves or slaves that are being controlled. Every master try to spread its region, but yes the number of slaves is always limited to per master. A master can made sub masters under its control to control more slaves. When the theory of master slave is being applied to machines, it becomes a little controversial to say who is master and who is slave as they both are controlled by humans who programmed them. When the term hacking is applied to this theory, it becomes a revenge. In the past, we have seen many trojans that are proved dangerous for…
-
MEET THE YOUTH MRBMINER. A TROJAN WHICH HAS ALREADY MINED MONERO FROM THOUSANDS OF SERVERS.
If we ask today’s youth, “What they like?”, the answer will be short and damn “fame”. Every youth in today’s time has a clear goal in his/her mind that he/she has to earn fame, but they don’t know what path to choose. Some may choose ethical and some may unethical. But adults knows this fact that fame comes from experience and hard work. Therefore, it is said that “Old is Gold”. In the past, we have covered articles many articles based on trojans that mines cryptocurrency from the systems. Today, we will talk about trojans from the same family but a youth from that family. Why we said youth? As…
-
ATTACKERS ARE MINING CRYPTO FROM SERVERS HAVING WEAK MS SQL PASSWORDS
Though the back end processes are not visible to the end user but they form the backbone of a website. The most challenging task for every full stack developer is to secure the backbone of their website as much as they can. Many webmasters fail to do that, keeping loopholes in security infrastructure of their site thus allowing attackers to take advantage of their resources. Most tech giants nowadays deploy layers of security to protect the privacy of their clients and their clients’ data resides in the database systems of their infrastructure. Previously, these databases resides as a single application inside the server, but now in this digital world, the…
-
OUTLAW BOTNET AFFECTS MORE THAN 20,000 LINUX SERVERS
DDOS attacks are emerging day by day. We know that DDOS attack is simply sending lots of packets to the remote server that server is not able to handle, thus making it unresponsive . In short, we test the limits of the remote server . But this group changed the definition . Coming back to 2018, Trend Micro Researchers unveiled a new group named Outlaw Botnet. In 2018, this group targeted Japanese art institution as well as a Bangladeshi government site over a vulnerability on Dovecot mail server. They have been involved in these cyber criminal activities for past couple of years. This time again they regain their presence and…