SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Cryptojacking stories

Story image
DDoS
Sysdig reveals a loss of $53 for every $1 cryptojackers gain
Last week
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Story image
ML
Sysdig releases CDR offering to combat cryptojacking
August 2022
Sysdig has unveiled a cloud detection and response (CDR) offering powered by machine learning to combat cryptojacking.
Story image
Ransomware
Ransomware, threats, IoT malware, cryptojacking on the rise
February 2022
Cyberattacks become more attractive and potentially more disastrous as dependence on information technology increases.
Story image
Ransomware
Cybercriminals target Linux-based systems with ransomware and cryptojacking
February 2022
As the most common cloud operating system, Linux is quickly becoming an attacker’s ticket into a multi-cloud environment. 
Story image
Cybersecurity
New botnet uncovered known for sextortion and crypto-jacking
December 2021
Check Point Research is warning of a new variant of Phorpiex, a botnet known for sextortion and crypto-jacking.
Story image
Cybersecurity
How Bitcoin could impact the cyber-threat landscape
January 2021
Bitcoin's escalating valuation has made some criminal organisations and malicious individuals very wealthy. The impact of this growth in wealth may have a severe impact on the future threat landscape.
Story image
Cybersecurity
Sophos unearths origin of prominent cryptominer
January 2021
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
Story image
Cryptocurrency
Cryptomining trojan malware discovered by ESET researchers
September 2020
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.
Story image
Cybersecurity
Phishing URLs grew by 640% last year - report
February 2020
“In the cybersecurity industry the only certainty is that there is no certainty, and there is no single silver bullet solution.”
Story image
Malware
Five tips to defend against cryptojacking - Bitglass
August 2019
The incidence of cryptojacking has seen rapid growth and has emerged as a favourite strategy for hackers.
Story image
Cybersecurity
Wandera reports on the state of mobile security in financial services
July 2019
“In the financial services industry, as in many sectors, the security of client information is the most important asset."
Story image
MFA
How to avoid becoming a cryptojacking victim - Bitglass
May 2019
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Story image
Cybersecurity
Cyber threats progressing as defenses evolve - Trustwave
April 2019
The findings illustrate cybercriminals deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills.
Story image
Cybersecurity
Survey shows organisations in the dark about shadow mining threat
April 2019
To be successful and remain undetected, shadow mining depends on deliberately configuring security systems to function incorrectly.
Story image
GDPR
New threats on the block: Formjacking, IoT, LotL attacks
February 2019
Symantec's report provides an overview of the threat landscape, including insights into global threat activity, cyber criminal trends, and motivations for attackers.
Story image
Microsoft
Cryptomining apps discovered on Microsoft’s app store
February 2019
It is believed that the eight apps were likely developed by the same person or group.
Story image
Botnet
2018 sees 1,500% increase in coinmining malware - report
December 2018
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
Story image
Malware
Mac malware on WatchGuard’s top ten list for first time
December 2018
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Story image
Ransomware
Exclusive: Securing cloud data in the APAC environment
November 2018
The majority of users are unable to develop good cyber hygiene in line with the rapid rate of digitalisation that the APAC region is undergoing.
Story image
Ransomware
Pseudo-ransomware Xbash targeting Linux and Windows discovered
September 2018
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
Story image
IoT security
Exclusive: Why NZ is particularly vulnerable to cryptomining
July 2018
Cryptomining is the newest cybersecurity threat dominating the headlines, but awareness of the attack method is still lacking among organisations.
Story image
Fortinet
Exclusive: Demystifying cryptojacking and how organisations can protect themselves
July 2018
Cryptojacking is the latest step in the evolution of malware monetisation methods.
Story image
Ransomware
Here’s what the threat landscape currently looks like, according to Fortinet
June 2018
Fortinet says there are indications that some cybercriminals now prefer hijacking systems and using them for cryptomining.
Story image
Ransomware
EXCLUSIVE: Rick McElroy shares how he’d breach an enterprise
June 2018
Carbon Black’s Rick McElroy asserts at the end of the day, cyberwar is not about systems but rather humans vs humans as they are the weakest link.