bitcoin | Page 2


Fortinet recently encountered a new Ransomware-as-a-Service (RaaS) advertisement called “Encryptor RaaS”. The service is advertised on an onion-based domain via Tor2Web service and Fortinet detects the associated ransomware as W32/Cryptolocker.ABD9!tr.  Interestingly, the seller explicitly calls its website “Ransomware as a Service”, an AV industry language, where the advertised business model closely resembles the recently discovered “Tox” RaaS. The seller earns a 20% commission per infected user who... [Read More]
by RSS Roland Dela Paz  |  Jul 29, 2015  |  Filed in: Security Research
Andromeda is a botnet that has had a long history. The latest version is now 2.09, which most active bots would have already received. Recently, however, our FortiGuard Labs Threat Intelligence system was able to capture the activities of a previous variant of Andromeda that is apparently still alive. During our analysis, we found that it is a cracked version of an old variant, and the author used it for spreading a Bitcoin miner. Andromeda 2.06 The network traffic of most Andromeda variants are very similar - the sent data is Base64-encoded,... [Read More]
by RSS He Xu  |  Jan 07, 2015  |  Filed in: Security Research
[Read More]
by RSS Michael Perna  |  Aug 09, 2014  |  Filed in: Industry Trends
[Read More]
by RSS Michael Perna  |  Mar 22, 2014  |  Filed in: Industry Trends
We are in the age of information and for the past 25 years the internet has been an awesome force for good. It has created an incredible information economy across networks and won our trust as a viable platform for the exchange of just about anything. However, underneath it all, there is a terrible tempest brewing. In a time when any motivated person can raise a few hundred thousand dollars in crowdfunding, so too can any motivated person find a way to steal it. The hacking economy is booming and the barriers to entry are low. Prerequisite knowledge... [Read More]
by RSS Michael Perna  |  Mar 17, 2014  |  Filed in:
[Read More]
by RSS Michael Perna  |  Feb 15, 2014  |  Filed in: Industry Trends
Hacktivity opened up with two excellent keynotes: a first one from Charlie Millier, and a second one from Mikko Hypponen. Charlie's keynote ("Mobile threats: Hype vs Reality") fuelled the next two interviews I had that day. Both reporters' first question was whether mobile threats existed for real, or were they just "a hype". As that question is probably on everybody's mind, let me clarify the situation. Mobile exploits. Agreed with Charlie, yes, there are only very few of these, and you can use your mobile phones quite safely without fear... [Read More]
by RSS Axelle Apvrille  |  Oct 17, 2013  |  Filed in: Security Research
Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin. In the new Bitcoin heists, the botnets that take over a victim's computer aren't intended to steal a victim's money - although they are certainly capable of doing that, too. However, in the latest shenanigans, the malware compromises a computer... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends