• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   bitcoin

Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground

  • Posted on:May 2, 2018 at 3:01 am
  • Posted in:Internet of Things, Malware
  • Author:
    Fernando Mercês (Senior Threat Researcher)
0

Crime follows the money, as the saying goes, and once again, cybercriminals have acted accordingly. The underground is flooded with so many offerings of cryptocurrency malware that it must be hard for the criminals themselves to determine which is best. This kind of malware, also known as cryptomalware, has a clear goal, which is to make money out of cryptocurrency transactions. This can be achieved through two different methods: stealing cryptocurrency and mining cryptocurrency on victims’ devices surreptitiously (without the victims noticing), a process also known as cryptojacking. In this post, we discuss how these two methods work, and see whether devices connected to the internet of things (IoT), which are relatively underpowered, are being targeted.

Read More
Tags: bitcoincryptocurrencycryptocurrency minercybercrimecybercriminal underground

Cerber Ransomware Evolves Again, Now Steals From Bitcoin Wallets

  • Posted on:August 3, 2017 at 7:00 am
  • Posted in:Malware, Ransomware
  • Author:
    Trend Micro
0

Cerber ransomware has acquired the reputation of being one of the most rapidly evolving ransomware families to date. Just in May, we pointed out how it had gone through six separate versions with various differences in its routines. Several months later and it seems to have evolved again, this time adding cryptocurrency theft to its routines. This is on top of its normal ransomware routines, giving the attackers two ways to profit off of one infection.

Read More
Tags: bitcoinCERBERransomware

Chinese-language Ransomware ‘SHUJIN’ Makes An Appearance

  • Posted on:May 12, 2016 at 8:03 am
  • Posted in:Deep Web, Malware, Ransomware
  • Author:
    Jasen Sumalapao (Threat Response Engineer)
0

Whenever a threat is “localized” to a specific region, it’s a sign that attackers believe there is money to be made. Ransomware has made millions of dollars around the world, and it looks like it’s poking its nose into a new part of the world: China. However, the initial foray into this market made several mistakes.

Read More
Tags: bitcoinChinaransomwareSHUJINTor

PETYA Crypto-ransomware Overwrites MBR to Lock Users Out of Their Computers

  • Posted on:March 25, 2016 at 2:17 am
  • Posted in:Bad Sites, Malware, Ransomware
  • Author:
    Jasen Sumalapao (Threat Response Engineer)
8

As if encrypting files and holding them hostage is not enough, cybercriminals who create and spread crypto-ransomware are now resorting to causing blue screen of death (BSOD) and putting their ransom notes at system startup—as in, even before the operating system loads. Imagine turning on your computer and instead of the usual Windows icon loading, you get a flashing red and white screen with a skull-and-crossbones instead.

Read More
Tags: bitcoinbsodcrypto-ransomwarecybercrimepetyaransomware

CTB-Locker Ransomware Includes Freemium Feature, Extends Deadline

  • Posted on:January 21, 2015 at 10:49 am
  • Posted in:Bad Sites, Malware, Ransomware
  • Author:
    Trend Micro
12

Last July we came across a crypto-ransomware variant known as Critroni or Curve-Tor-Bitcoin (CTB) Locker. We observed recent improvements to the CTB malware, which now offer a “free decryption” service, extended deadline to decrypt the files, and an option to change the language of the ransom message. These new variants also demand payment of 3 BTC…

Read More
Tags: bitcoincrypto-ransomwarectb-locker
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.