×
Cryptocurrency

Cloud-based Mining Botnet Trends in 2019: Mining Trojans Spreading as Worms

This article provides an in-depth analysis of the trends of mining trojans observed in 2019 based on the long-term monitoring data of the Alibaba Cloud Security team.

Learn the Strategies and Tactics of Cryptocurrency Mining Trojans

This article will look at some common technologies and development trends of cryptocurrency mining Trojans, showing you how you can better project yourself.

How the Blockchain Can Protect Your Fintech Data

In this blog, we look at how blockchain technology extends beyond cryptocurrencies and how it can be applied to fintech security.

8220 Mining Group Now Uses Rootkit to Hide Its Miners

The Alibaba Cloud Security Team has recently discovered that the 8220 Mining Group began using rootkit to hide its mining programs.

Deep Dive into Cloud Firewall: Addressing Aggressive Mining Worms

This article provides an in-depth analysis of how Alibaba Cloud's Cloud Firewall addresses aggressive mining worms.

Return of Watchbog: Exploiting Jenkins CVE-2018-1000861

Watchbog, a cryptocurrency-mining botnet, has made a comeback by exploiting Jenkins CVE-2018-1000861 this time.

JPM Coin: J.P. Morgan's Endeavor in Blockchain

This article briefly introduces the JPM Coin, a digital coin for payments launched by J.P. Morgan.

Introduction to Federation in Stellar Blockchain

In this article, we will discuss the Stellar blockchain network and federation server, and describe how to deploy one on Alibaba Cloud ECS.

ProtonMiner Gains Momentum via Expanded Attack Surface

The post provides a detailed analysis of ProtonMiner, a new cryptocurrency miner hijacker discovered by Alibaba Cloud, and security recommendations to avoid it.

Alibaba Cloud Security: 2018 Cryptocurrency Mining Hijacker Report

In this report, we analyze the current state of malicious cryptocurrency mining and provide security recommendations based on Alibaba Cloud's data from 2018.

Threat Alert: Multiple Cryptocurrency Miner Botnets Start to Exploit the New ThinkPHP Vulnerability

Alibaba Cloud security team has detected new attacks based on the ThinkPHP vulnerability, in which botnets BuleHero and Sefa exploited hosts for various cybercrime purposes.

Blockchain and its Impact on Different Sectors

Transactions on Blockchain are quicker, making it a more cost-effective mechanism for reporting and decision-making.