While the website’s front-end is digging for cryptocurrencies, the back-end is secretly hosting a keylogger designed to steal unsuspecting users’ login credentials.
Read more in my article on the Hot for Security blog.
Cloud-based NexusLogger’s user-friendly web portal makes it simple for non-skilled criminals to configure the malware however they want.
David Bisson reports.
German researchers say they have found a way to transmit data from infected computers, when they aren’t connected to any other devices or networks.
Malware has infected the control systems used by the United States Air Force to fly Predator and Reaper drones, logging keypresses as the unmanned aircraft are flown remotely in Afghanistan, Libya, Pakistan and other conflict zones.
A keylogger is being blamed for a high profile attack which allowed hackers to gain control of the NBC News Twitter account, and post bogus messages about a terrorist attack.
USB hardware keyloggers have been found attached to the back of two PCs in Manchester, England.
Remotely hacking into a computer is wrong, right?
Well, maybe not if it’s your computer – that was stolen from you two years beforehand..