Cryptojacking Attacks: Who’s Mining on Your Coin?

Data from the “IBM X-Force Threat Intelligence Index” for 2018 illustrated that threat actors have been increasingly using malicious cryptomining, aka cryptojacking attacks, to easily monetize their access to systems with minimal risk. The 2019 report showed that threat actors continue to use these attacks to compromise systems and generate…

Read More

How a Cunning Remote Overlay Malware Met Its Match

co-authored by Nadav Katzenell, Head of Machine Learning, Data & Research, IBM Trusteer This article explores how an aggressive and elusive remote overlay PC malware that is attacking Latin American banks met its match in a solution built from behavioral biometrics, deep research, reverse engineering and finely tuned threat modeling.…

Read More