Please note, this is a STATIC archive of website cointelegraph.com from 17 Oct 2021, cach3.com does not collect or store any user information, there is no "phishing" involved.

Malware News

Malicious software, or malware, is a piece software made to damage a computer or a network. Malware operates from within the targeted system and needs to be implanted into it before the execution of its program. Trojan malware is one of the most popular damaging tools, which is usually executed by the misled user themself. An executed trojan can offer hackers the opportunity to access a user’s private information, install some mining malware or encryption malware without the target’s knowledge about it. Malware can be used for various purposes, such as to damage system maintenance, or to gain access to trade secrets or to secret government information. Bitcoin-stealing malware and other cryptocurrency-targeted programs are also widely used alongside the malware for stealing fiat money. The problem of malware for businesses and users becomes more concerning with the growing speed of IT-implementation into daily life.
News
‘Shitcoin Wallet,’ an Ethereum wallet available as a Chrome Browser extension, is injecting malicious javascript to steal user’s data.
Chrome Browser Extension Ethereum Wallet Injects Malicious JavaScript To Steal Data
Rachel Wolfson
2019-12-31T21:18:00+00:00
10780
News
Researchers have published a new report on what they say is a “relentless” crypto mining botnet that lurks behind seemingly innocuous content like JPEG images o...
Monero Malware Botnet Lurks Behind Taylor Swift JPEGs
Marie Huillet
2019-12-19T13:45:00+00:00
4493
News
Security researchers have discovered a new cryptocurrency-related macOS malware believed to be developed by North Korean hackers at the Lazarus Group.
Researchers Detect New North Korea-Linked MacOS Malware on Crypto Trading Site
Ana Alexandre
2019-12-04T16:25:00+00:00
4067
News
Security researchers have uncovered a vulnerability that could allow hackers to access private data on any Android phone, including login credentials to crypto ...
Report: Android Vulnerability Allows Hackers to Steal Crypto Wallet Info
Joeri Cant
2019-12-03T21:38:00+00:00
7995
News
Launched on Nov. 24, a new cryptojacking campaign uses Docker platforms that have API endpoints exposed online to mine XMR.
Hackers Mass-Scanning Web for Docker Platforms to Mine Cryptocurrencies
Helen Partz
2019-11-27T18:58:00+00:00
5323
News
Major antivirus software supplier Eset has found cyber criminals using YouTube to distribute mining modules to cryptojack Monero.
Report: Cyber Criminals Are Using YouTube To Install Cryptojacking Malware
Joeri Cant
2019-11-27T02:00:00+00:00
28370
News
Microsoft security analysts reveal that cryptocurrency-stealing malware “Dexphot” already infected 80,000 computers earlier this year.
New Crypto-Stealing Malware Infected 80,000 Computers, Microsoft Says
Joeri Cant
2019-11-26T20:01:00+00:00
8867
News
The software available for download on Monero’s official website was compromised to steal cryptocurrency.
Malware on Official Monero Website Can Steal Crypto: Investigator
Adrian Zmudzinski
2019-11-19T13:00:00+00:00
4528

Follow us on Facebook