Einschränkung der Auswahl
Alle Artikel aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008/2009
oder nur Artikel des
• Entwickler Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2008-2010
alle (lang!)
• Mobile Technology aus
2019
2016
2015
2014
2012/2013
alle (lang!)
• PHP Magazin / PHP User aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009/2010
alle (lang!)
• windows.developer / dot.Net Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2008-2011
alle (lang!)
• oder der anderen Magazine
Krypto-Miner, überall Krypto-Miner!
Schürfen Sie Kryptowährung?
Im
Windows Developer 8.19
ist ein Artikel über Kryptp-Mining durch Schadsoftware erschienen.
Links
- [1] Coogan, Peter; Symantec Security Response Blog: "Bitcoin Botnet Mining"
- [2] Symantec: "Trojan.Coinbitminer"
- [3] Symantec: "Trojan.Badminer"
- [4] Jensen, Poul; Symantec Security Response Blog: "Bitcoin Mining with Trojan.Badminer"
- [5] Lau, Hon; Symantec Security Response Blog: "Introducing Trojan.Badlib: A Malware Distribution Network"
- [6] Dela Paz, Roland; Trend Micro Security Intelligence Blog: "TDL4 Worm Component Employs Bitcoin Mining"
- [7] Eilers, Carsten; entwickler.de: "WannaCry – die Ransomware erklärt"
- [8] Brenner, Bill; Sophos Naked Security: "Cryptocurrency-mining malware cashes in on NSA exploit that enabled WannaCry"
- [9] Tancio, Buddy; Trend Micro Security Intelligence Blog: "Cryptocurrency Miner Uses WMI and EternalBlue To Spread Filelessly"
- [10] Eilers, Carsten; Windows Developer 12.2016: "WMI in Angreiferhand"
- [11] Singh, Neeraj; F-Secure News from The Lab: "NRSMiner updates to newer version"
- [12] Gatlan, Sergiu; Bleeping Computer: "Malware Creates Cryptominer Botnet Using EternalBlue and Mimikatz"
- [13] Kubovic, Ondrej; ESET WeLiveSecurity: "EternalBlue reaching new heights since WannaCryptor outbreak"
- [14] Palmer, Danny; ZDNet: "A giant botnet is forcing Windows servers to mine cryptocurrency"
- [15] Seals, Tara; Threat Post: "MassMiner Takes a Kitchen-Sink Approach to Cryptomining"
- [16] Eilers, Carsten: "Flame? - Kein Grund zur Panik!"
- [17] Trend Micro; Trend Micro Security Intelligence Blog: "Down but Not Out: A Look Into Recent Exploit Kit Activities"
- [18] Kolesnikov, Alexander; Kaspersky Lab SecureList: "Nhash: petty pranks with big finances"
- [19] Osis, Kaspars; ESET WeLiveSecurity: "Kodi add-ons launch cryptomining campaign"
- [20] Duncan, Brad; Palo Alto Networks Unit 42: "Fake Flash Updaters Push Cryptocurrency Miners"
- [21] Agcaoili, Janus; Sison, Gilbert; Trend Micro Security Intelligence Blog: "Cryptocurrency-Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine"
- [22] Remillano II, Augusto; Macaraeg, Arvin; Trend Micro Security Intelligence Blog: "Miner Malware Spreads Beyond China, Uses Multiple Propagation Methods Including EternalBlue, Powershell Abuse"
- [23] Guo, Yuanjing; Dong, Tommy; Symantec Threat Intelligence Blog: "Several Cryptojacking Apps Found on Microsoft Store"
- [24] Cluley, Graham: "Calendar 2 app pulled from Mac App Store after cryptomining controversy"
- [25] Zhang, Veo; Trend Micro Security Intelligence Blog: "Mobile Malware Mines Dogecoins and Litecoins for Bitcoin Payout"
- [26] Gu, Jason; Zhang, Veo; Shen, Seven; Trend Micro Security Intelligence Blog: "Coin Miner Mobile Malware Returns, Hits Google Play"
- [27] Stefanko, Lukas; ESET WeLiveSecurity: "Cryptocurrency scams on Android: Do you know what to watch out for?"
- [28] Wardle, Patrick; Objective-See: "Analyzing OSX/CreativeUpdater - a macOS cryptominer, distributed via macupdate.com"
- [29] Faou, Matthieu; ESET WeLiveSecurity: "Cryptocurrency web mining: In union there is profit"
- [30] Wikipedia: "Coinhive"
- [31] Bisson, David: "The Pirate Bay website quietly runs a cryptocurrency miner on visitors’ PCs, gobbling up CPU cycles"
- [32] Chen, Joseph C; Trend Micro Security Intelligence Blog: "EITest Campaign Uses Tech Support Scams to Deliver Coinhive’s Monero Miner"
- [33] Liu, Chaoying; Chen, Joseph C.; Trend Micro Security Intelligence Blog: "Malvertising Campaign Abuses Google’s DoubleClick to Deliver Cryptocurrency Miners"
- [34] Goodin, Dan; ars technica: "Now even YouTube serves ads with CPU-draining cryptocurrency miners"
- [35] Foltyn, Tomas; ESET WeLiveSecurity: "US and UK government websites hijacked to mine cryptocurrency on visitors’ machines"
- [36] McKay, Martin; texthelp: "Data security investigation underway at Texthelp"
- [37] Ducklin, Paul; Sophos Naked Security: "Cryptomining script poisons government websites – What to do"
- [38] O'Donnell, Lindsey; Threat Post: "Cryptojacking Attack Found on Los Angeles Times Website"
- [39] Liu, Chaoying; Chen, Joseph C.; Trend Micro Security Intelligence Blog: "Cryptocurrency Web Miner Script Injected into AOL Advertising Platform"
- [40] Bermejo, Lenart; Shih, Hsiao-Yu ; Trend Micro Security Intelligence Blog: "Digmine Cryptocurrency Miner Spreading via Facebook Messenger"
- [41] Chen, Joseph C.; Trend Micro Security Intelligence Blog: "Malicious Chrome Extensions Found in Chrome Web Store, Form Droidclub Botnet"
- [42] Foltyn, Tomas; ESET WeLiveSecurity: "Google banishes cryptocurrency mining extensions from Chrome Web Store"
- [43] Krebs, Brian; Krebs on Security: "Crypto Mining Service Coinhive to Call it Quits"
- [44] Mursch, Troy; Bad Packets Report: "Large cryptojacking campaign targeting vulnerable Drupal websites"
- [45] Lorenz, Nicole; Alvira Blog: "10,000 WordPress sites hacked and used in huge malvertisement scheme"
- [46] Foltyn, Tomas; ESET WeLiveSecurity: "‘Highly critical’ bug exposes unpatched Drupal sites to attacks"
- [47] Kuzin, Mikhail; Shmelev, Yaroslav; Galov, Dmitry; Kaspesky Lab SecureList: "SambaCry is coming"
- [48] Marinho, Renato; ISC Diary: "Campaign is using a recently released WebLogic exploit to deploy a Monero miner"
- [49] Ullrich, Johannes B.; ISC Diary: "A Story About PeopleSoft: How to Make $250k Without Leaving Home."
- [50] Lin, Hubert; Trend Micro Security Intelligence Blog: "Struts and DotNetNuke Server Exploits Used For Cryptocurrency Mining"
- [51] Lin, Hubert; Trend Micro Security Intelligence Blog: "Vulnerabilities in Apache CouchDB Open the Door to Monero Miners"
- [52] Marinho, Renato; ISC Diary: "Apache SOLR: the new target for cryptominers"
- [53] Marinho, Renato; ISC Diary: "WebLogic Exploited in the Wild (Again)"
- [54] Karasek, Jindrich; Lu, Loseway; Trend Micro Security Intelligence Blog: "Cryptocurrency Miner Spreads via Old Vulnerabilities on Elasticsearch"
- [55] Seals, Tara; Threat Post: "Oracle WebLogic Exploit-fest Continues with GandCrab Ransomware, XMRig"
- [56] Edelstein, Arthur; Mozilla Blog: "Protections Against Fingerprinting and Cryptocurrency Mining Available in Firefox Nightly and Beta"
- [57] O'Donnell, Lindsey; Threat Post: "Ad Network Circumvents Ad-Blocking Tools To Run In-Browser Cryptojacker Scripts"
- [58] Lepla, Simon (Platzii): [dockmylife/memorytest] Report malicious image
- [59] Stemm, Mark; Sysdig: "Fishing for Miners – Cryptojacking Honeypots in Kubernetes"
- [60] Maciejak, David; Fortinet: "Yet Another Crypto Mining Botnet?"
- [61] Kromtech Security Center: "Cryptojacking invades cloud. How modern containerization trend is exploited by attackers"
- [62] Wong, Jamin; Antwort auf [58]
- [63] Lin, Hubert; Yarochkin, Fyodor; Oliveira, Alfredo; Trend Micro Security Intelligence Blog: "Misconfigured Container Abused to Deliver Cryptocurrency-mining Malware"
- [64] Oliveira, Alfredo; Trend Micro Security Intelligence Blog: "Exposed Docker Control API and Community Image Abused to Deliver Cryptocurrency-Mining Malware"
- [65] Vaas, Lisa; Sophos Nakes Security: "Starbucks Wi-Fi hijacked customers’ laptops to mine cryptocoins"
- [66] Cube, Arnau: "CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests"
- [67] Waugh, Rob; ESET WeLiveSecurity: "Surveillance cameras hijacked to mine Bitcoin while watching you"
- [68] Dr.Web: "Doctor Web examines two Linux Trojans"
- [69] Lorenz, Nicole; Avira Blog: "Android malware infects Amazon TV devices"
- [70] Lorenz, Nicole; Avira Blog: "MikroTik: 415 thousand routers affected by cryptominer"
- [71] Varner, Brian; Symantec Blog: "Yes, We Used a Router to Fry an Egg and Here’s Why"
- [72] Kerner, Sean Michael; eWEEK: "Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack"
- [73] Thomson, Iain; The Register: "Now that's taking the p... Sewage plant 'hacked' to craft crypto-coins"
- [74] Kaspersky Lab ICS CERT; Kaspersky Lab SecureList: "Threat Landscape for Industrial Automation Systems in H2 2017"