Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Cryptomining

Unauthorised cryptomining

Unauthorised cryptomining

Jul 1, 2018 - The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. . What is unauthorised cryptocurrency mining? Cryptocurrency mining (cryptomining) software uses a system's processing power to solve complex mathematical problems, in return for a type of digital currency. Unauthorised…
Cyber threats

Common threat types

Jul 1, 2018 - The cyber threat to Australian individuals and organisations is undeniable, unrelenting and continues to grow. You could be a target even if you don't think the information held on your networks is valuable, or that your business would be of interest to cyber adversaries. Many organisations are at risk purely because they are vulnerable through unpatched software or unaware staff members. Common threats impacting…
Browsealoud

ACSC statement on cryptocurrency miner inserted into BrowseAloud

Feb 12, 2018 - Main points The ACSC has become aware of an unauthorised cryptocurrency miner inserted in the BrowseAloud website plugin made by Texthelp. If organisations are using this plugin the ACSC advises your internal networks and websites are not at risk of compromise. Texthelp has released a statement advising that personal and customer data has not been accessed or lost. The security issue has been addressed by Texthelp and…