Cisco Talos Intelligence Blog

  • Blog
  • Podcasts
Cisco Systems, Inc.
Cisco Talos Blog
  • Software
  • Vulnerability Information
    • Vulnerability Information

    • Vulnerability Reports
    • Microsoft Advisories
  • Reputation Center
    • Reputation Center

    • IP & Domain Reputation
    • Talos File Reputation
    • Secure Endpoint Naming Conventions
    • Intelligence Categories
  • Library
  • Support
  • Incident Response
  • Blog
  • Podcasts
    • Podcasts

    • Beers with Talos
    • Talos Takes
  • Careers
  • About

Cryptomining Campaign Returns Coal and Not Diamond

By Vanja Svajcer

Monday, April 23, 2018 12:04
Cryptocurrency
Share this post

Related Content

Following the Money: Comparing cryptocurrency value to illicit mining activity

July 14, 2021 08:07

By Nick Biasini In the age of meme stocks, Robinhood and Elon Musk's tweets influencing the global economy, cryptocurrency mining has not seemed as fringe as it once did. Mining has been around as long as these crytocurrencies have, but only really started to gather the attention of criminals in

Lemon Duck brings cryptocurrency miners back into the spotlight

October 13, 2020 10:10

By Vanja Svajcer, with contributions from Caitlin Huey. * We are used to ransomware attacks and big-game hunting making headlines, but there are still methods adversaries use to monetize their efforts in less intrusive ways. * Cisco Talos recently recorded increased activity of the Lemon Duck cryptocurrency-mining botnet using several techniques likely

Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”

September 17, 2019 11:09

By Christopher Evans and David Liebenberg. Executive summary A new threat actor named "Panda" has generated thousands of dollars worth of the Monero cryptocurrency through the use of remote access tools (RATs) and illicit cryptocurrency-mining malware. This is far from the most sophisticated actor we've ever seen, but it still

  • Software
  • Reputation Center
  • Vulnerability Inforamtion
  • Microsoft Advisory Snort Rules
  • Incident Response
  • Secure Endpoint Naming Conventions
  • Talos File Reputation
  • Library
  • Support Communities
  • About
  • Careers
  • Talos Blog
  • Threat Source newsletters
  • Beers with Talos Podcast
  • Talos Takes Podcast
Connect with us
  • Follow us on Twitter
  • Watch our informational videos on YouTube
  • Connect with us on LinkedIn
Cisco Security

© Cisco Systems, Inc. and/or its affiliates. All rights reserved. View our Privacy Policy