• News and Threat Analysis

    NICOMINER GOES WILD, EXPLOITING MULTIPLE VULNERABILITIES TO MINE CRYPTOCURRENCY FROM SYSTEMS

    “NICO JIANG” – FROM A SMALL CRACKING TOOLS’ AUTHOR TO A MINER AUTHOR We all are adapting ourselves to the new normal where virtuality is the only way for authentication. But we can not ignore the fact that cryptocurrency is already known to get authentication without losing your identity. In this currency, authentication is just performed through a digital ledger and the identity of the person is kept anonymous. While some big influencers and celebrities like Elon Musk promote the use of this currency, from some past statistics, it has also been proven to be one of the best ways for the attackers to get paid for their illegal tasks.…

  • News and Threat Analysis,  Tools, Tricks and More

    UNCONFIGURED REDIS DBMS EXPOSE THOUSANDS OF SERVERS TO MINING TROJANS

    HACKERS RUSH IN DEPLOYING MINERS AFTER SURGE IN BITCOIN MARKET VALUE Though banned in many countries, virtual and digital cryptocurrencies have caught many investors’ eyes in the last few days. There is no doubt on this fact that these currencies are not meant for short term profits but its long-term profits are much more valuable than investing in some future goal funds. Thus, for some who already know about it and have invested a lot by taking risks, this investment has turned out to be an ace of spades that has made huge profits for them. Cryptocurrencies are one of the major sources of anonymity by hackers. If we go…

  • News and Threat Analysis,  Tools, Tricks and More

    THIS CRYPTO MINING TROJAN HAS INFECTED MORE THAN 15000 SERVERS. IS YOUR NEXT?

    Experts have researched a Miner Trojan named TopMiner that uses the methodology of SSH blasting attacks- an attack which results due to weak passwords or vulnerable SSH accounts to get into the servers. After successfully attacking the vulnerable servers with the trojan, malware downloads the SSH blasting program and some other scripts to take-over the root account for the Linux systems with port 22 open available on the network.

  • News and Threat Analysis

    A SINGLE VULNERABILITY IN APACHE COULD ALLOW ATTACKERS TO LAUNCH 8 DIFFERENT EXPLOITS TO TAKE OVER YOUR IT ASSETS

    It’s a matter of fact that to earn living, you need to serve required service to the people in one way or the other. Serving is the only way to survive in the environment. If you are a tech geek, you might know this fact that machines too communicate using this concept i.e there exists a server and the client requests for the required service. The server then accordingly response and entertains the end user uniquely. But do we actually know what’s makes a server differentiable from the client (as at the end they both are machines)? On the upper layer, any machines running the web server software like Apache…

  • News and Threat Analysis

    THIS NEW VARIANT OF MYKINGS BOTNET IS SUPPORTED BY PCSHARE TROJAN TO MAKE YOUR SYSTEM A SLAVE!

    All the creatures around us are either masters who control slaves or slaves that are being controlled. Every master try to spread its region, but yes the number of slaves is always limited to per master. A master can made sub masters under its control to control more slaves. When the theory of master slave is being applied to machines, it becomes a little controversial to say who is master and who is slave as they both are controlled by humans who programmed them. When the term hacking is applied to this theory, it becomes a revenge. In the past, we have seen many trojans that are proved dangerous for…