×
Trojan

The Influx of Banking Trojans – A New Variant of BankBot Trojan

Researchers from the security company Dr.Web reported a while back that the source code of a recent untitled Android bank Trojan was leaked.

Data Insights in Cybersecurity Part 1: Intro to ssdeep and XOR.DDoS Case Study

In this article, I describe how my team at Alibaba Cloud implemented fuzzy hashing at scale, showing visualizations of our XOR DDoS detection.

Learn the Strategies and Tactics of Cryptocurrency Mining Trojans

This article will look at some common technologies and development trends of cryptocurrency mining Trojans, showing you how you can better project yourself.

ImposterMiner Trojan Takes Advantage of Newly Published Jenkins RCE Vulnerability

Alibaba Cloud Security team has recently detected a crypto-mining attack which uses the newly published Jenkins RCE vulnerability as its attack vector.

Return of Watchbog: Exploiting Jenkins CVE-2018-1000861

Watchbog, a cryptocurrency-mining botnet, has made a comeback by exploiting Jenkins CVE-2018-1000861 this time.