Yahoo Web Search

  1. End-to-end PaaS simplicity at its best: Deploy, manage, scale effortlessly with Heroku. Go from code to running app in minutes. Deploy, scale, & deliver your app to the world!

    Eco & Basic Dynos - From $5.00/month - View more items
    • Pricing

      Flexible pricing options,

      from personal to enterprise

    • Heroku Data Services

      Build data-driven apps

      with fully managed data services

  2. Wide range of new & high quality Products. Contact Verified Suppliers Now. Global Sources is the leading B2B marketplace in Asia. Buy online today

Search results

  1. Mar 7, 2023 · Alibaba Cloud will provide archival node services and secure cloud infrastructure for validators for Sui’s testnet to help create more user-friendly experiences – widely seen as a key factor in...

    • brandybetz@coindesk.com
    • Reporter
  2. This article provides an in-depth analysis of how Alibaba Cloud's Cloud Firewall addresses aggressive mining...

  3. Nov 16, 2021 · Trend Micro reported Monday that multiple hacking groups are targeting Alibaba Cloud servers to install cryptocurrency mining—"cryptojacking"—malware.

    • Nathaniel Mott
  4. Dec 3, 2022 · Alibaba Cloud, or Aliyun, a subset of Chinese e-commerce giant Alibaba, announced an integration with Avalanche blockchain to power the company’s Node-as-a-Service initiatives.

    • Arijit Sarkar
    • Some CORE Points
    • Sharpening The Tool: Attack Techniques
    • Road to Wealth: Profit-Making Approaches
    • Survival Or Destruction: Persistence Techniques
    • Surviving in The Market - Resource Contention Techniques
    • Defense Suggestions
    Today, trojans are distributed as worms, the exploitation of a combination of vulnerabilities is becoming a trend, and the exploitation of N-day vulnerabilities is accelerating. These trends are wo...
    The persistence techniques of trojans are widely used, with Rootkit and fileless attack techniques becoming the trend. After hacking your system, cryptocurrency mining trojans want to mine cryptocu...
    Trojans tend to spread across platforms. The Go languageis naturally capable of cross-platform compilation. This allows black market cybercrime groups to implant trojans across multiple platforms....

    Network-Wide Vulnerability Scanning and Distribution

    1. Distribute trojans by attacking network-wide vulnerabilities based on one or more IP addresses. This distribution method is primitive. Trojans cannot be spread horizontally or efficiently, but can be easily intercepted by network defense. According to our monitoring results, only a small number of trojans are distributed in this way. For example, 8220 Miner launches persistent attacks by using multiple fixed overseas IP addresses. 8220 Miner changes IP addresses regularly but not frequentl...

    From Single-Vulnerability Exploitation to the Horizontal Spread of Combined Vulnerabilities

    In the early days, cryptocurrency mining trojans were spread in public networks by the exploitation of fixed vulnerabilities. The spread was slow and was restricted in scale. The exploitation of a combination of vulnerabilities enables cryptocurrency mining trojans to spread horizontally in internal networks. The attack module integrates common attack methods such as web service vulnerabilities, brute-force cracking, and database vulnerabilities. A "smart" cryptocurrency mining trojan creator...

    Quick Exploitation of N-day Vulnerabilities

    Common vulnerabilities that are widespread and have not been fixed on the Internet usually become "the piece of well-marbled meat" fought for by cryptocurrency mining botnets. After an outbreak, an N-day vulnerability cannot be effectively fixed in a short period of time. Therefore, black market cybercrime groups with "a good nose" add it to the attack library for cryptocurrency mining trojans. According to our observation, the window of vulnerability left for O&M personnel to fix an N-day vu...

    Mining Pool Configuration Method

    A cryptocurrency mining trojan is implanted into an open-source cryptocurrency mining program for mining. When the program is started, cryptocurrency mining parameters are passed in through the command line. This method is relatively primitive, and the trojan cannot modify its configuration parameters. More commonly, a cryptocurrency mining trojan is delivered by using a configuration file, and cryptocurrency mining parameters are controlled by scheduled tasks. Both methods are prone to being...

    Cryptocurrency Mining Method: Public Mining Pool and Mining Pool Proxy

    1. Public mining pool The use of anonymous public mining poolsis the most common method for malicious cryptocurrency mining. It is simple, but is also prone to being traced, because an independent wallet address is required during configuration. In addition, it cannot manage bot mining. 1. The following figure shows how to query the wallet address and the computing capability of 8220 Miner in the public mining pool. Currently, 15.5 Monero coinshave been mined from this address. Based on this,...

    Other Monetization Methods: Leverage DDoS and Socks Proxies

    In addition to mining cryptocurrencies, some black market cybercrime groups monetize the cryptocurrencies in other ways, such as by using DDoS and proxies. For example, in the following figure, a malicious sample of sicMiner runs a python script, which is an open source socks5 proxy on GitHub. The proxy runs on port 7081. The cybercrime group may have monetized this by selling the proxy.

    After a cryptocurrency mining trojan successfully intrudes into the target operating system, it needs to reside there for a long time to produce cryptocurrencies continuously and stably. Therefore, in most cases, various techniques are used to defend against security detection and removal by O&M personnel.

    In addition to confronting security software, cryptocurrency mining botnets also face competition in the same industry. After all, CPU resources are limited, and one device cannot accommodate two "horses".

    Enterprises need to manage vulnerabilities and fix them in a timely manner. Otherwise, they can easily become victims of cryptocurrency mining trojans.
    We recommend that you use the next generation of Cloud Firewallprovided by Alibaba Cloud Security. It can block malicious external connections and configure intelligent policies to help defend effe...
    Users with higher customization requirements can choose Alibaba Cloud Managed Security Service. After you purchase this service, experienced security experts will provide consultation services, tai...
  5. Sep 28, 2021 · E-commerce giant Alibaba will stop selling specialized mining equipment on its platforms on Oct. 8. Alibaba said Monday its decision was in response to the latest People’s Bank of China...

  6. People also ask

  7. Welcome to Alibaba Cloud and find out more detail about bitcoin mining. JbossMiner Mining Malware analysis blog. https://www.alibabacloud.com/blog/593804. This article provides an in-depth analysis of one of the most advanced crypto- mining tools detected to-date, performed by ...

  1. techtarget.com has been visited by 100K+ users in the past month

    Learn how AI can drive business success while prioritizing sustainability. Discover how organizations are harnessing AI sustainably

  1. People also search for