- Joined
- Feb 21, 2013
- Messages
- 10,523
- Reaction score
- 14,001
Hackers have found a way to install cryptominers on your devices, even if you have an antivirus program installed.
The campaign was recently discovered by cybersecurity researchers from Elastic Security Labs and Antiy, who named it REF4578, but weren’t able to attribute it to any specific, or known, threat actor.
This devious malware can turn off your security protection without you even realizing — and then download a load of cryptominers
More detailed article.
Researchers spot cryptojacking attack that disables endpoint protections
This has more info
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs
The campaign was recently discovered by cybersecurity researchers from Elastic Security Labs and Antiy, who named it REF4578, but weren’t able to attribute it to any specific, or known, threat actor.
This devious malware can turn off your security protection without you even realizing — and then download a load of cryptominers
More detailed article.
Researchers spot cryptojacking attack that disables endpoint protections
This has more info
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs