cognitive cybersecurity intelligence

News and Analysis

Search

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has uncovered a sophisticated cryptomining scheme that exploits misconfigured Jupyter Notebooks, used by data scientists, on both Windows and Linux systems. The attack involves several stages, encrypted payloads and manipulation of COM objects to ultimately deploy miners for a variety of cryptocurrencies. The attack is a prime example of how threat actors are evolving their methods to maximise profits from vulnerable cloud infrastructure. This can lead to reduced system performance, heightened operational costs, and increased security risks for impacted organisations.

Source: gbhackers.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Identity and Access Management (IAM)

Identity and Access Management (IAM)

CISOs face mounting pressure to secure digital identities, with 80% of breaches stemming from compromised credentials. Identity and Access Management (IAM) must evolve into a