2023-9-13 14:43 |
A hot wallet of the crypto exchange used to hold users’ tokens was exploited by attackers on Tuesday.
Similar to Notcoin - Blum - Airdrops In 2024
2023-9-13 14:43 |
A hot wallet of the crypto exchange used to hold users’ tokens was exploited by attackers on Tuesday.
Similar to Notcoin - Blum - Airdrops In 2024
Messaging app Telegram denies users were at risk after a security exploit was discovered that could allow attackers to gain control of a macOS device’s camera.
2023-5-18 12:21 | |
Recently, the Arbitrum community has posted warnings to investors about the possibility of scammers generating fake Arbitrum airdrops. This tactic is popularly known as phishing, where attackers devise a deceptive means to manipulate users into giving out their wallet private keys.
2023-3-20 18:00 | |
Exchange owners cautioned against downloads of malicious as attackers zeroed in on gullible users with a very relevant and specific narrative.
2022-12-7 16:07 | |
The crypto industry is fraught with different malicious actors preying on unsuspecting users, especially the cryptojacking attackers. Many hacks and exploits occur in the industry, targeting crypto firms and individual investors.
2022-7-31 19:30 | |
On December 31, Illuvium’s official Discord channel got phished when attackers directed users to a website claiming to be Illuvium’s NFT platform, causing approximately $150,000 in losses.
2022-2-20 14:05 | |
Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a computationally intensive activity. And Google Cloud customers can access it at a cost.
2021-11-28 21:00 | |
Prime Minister Narendra Modi has become the latest victim of a Twitter hack undertaken to trick social media users into sending crypto to the attackers.
2020-9-3 06:44 | |
A hypothetical man-in-the-middle attack would have allowed an attacker to hold users’ crypto for ransom on Trezor and KeepKey hardware wallets.
2020-9-3 23:15 | |
Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The findings — disclosed by California-based enterprise security solutions provider Proofpoint US — discovered at least 77 percent of email attacks on the medical sector during the first three months of 2019 involved the use of malicious links.
2019-10-9 19:00 | |
Threat actors have exploited “obscure” bugs in WebKit and Chrome browsers to serve over 1 billion malicious ads in less than two months, a new research has found. The attackers targeted iOS and macOS users with zero-day vulnerabilities in Chrome and Safari browsers that bypassed built-in security protections to show potential victims intrusive pop-up ads, and redirect users to malicious sites.
2019-10-2 09:16 | |
On August 30, software programmer Rusty Russell announced that he had found a major security vulnerability in various lightning projects that could have allowed attackers to strip users off their money.
2019-9-28 17:03 | |
In the first nine months of the year, the rising Bitcoin (BTC) prices made attackers dust out sextortion emails. Symantec traced wallets and addresses, estimating that the scam raised around 12.
2019-9-25 18:00 | |
Cybersecurity researchers have discovered a new strain of the nefarious Glupteba malware that uses the Bitcoin blockchain to ensure it remains dangerous. TrendMicro’s latest blog details the previously undocumented variant which is capable of invading systems to mine Monero cryptocurrency and steal sensitive browser data like passwords and cookies.
2019-9-4 17:09 | |
A large scale dusting attack has been suffered by Litecoin users, reported Binance on August 10. A dusting attack is a new kind of malicious activity where scammers and hackers try and break the privacy of the cryptocurrency users by sending tiny amounts of coins to their personal wallets. Attackers track down the transaction activity […]
2019-8-10 20:23 | |
Vulnerabilities uncovered in WhatsApp — the messaging app used by about 1. 5 billion users across the world — can allow bad actors to exploit the platform to manipulate or spoof chat messages. The flaws would make it possible to “intercept and manipulate messages sent in both private and group conversations, giving attackers the power to create and spread misinformation from what appear to be trusted sources,” the researchers noted.
2019-8-8 14:01 | |
Binance is currently running interference against what it views as a “fear, uncertainty, and doubt” campaign against the Bitcoin exchange giant. The objective of its perceived attackers seems to be making Binance users believe that their know-your-customer or private information is not private at all.
2019-8-8 17:41 | |
Nefarious hackers are wiping files on publicly accessible storage devices and leaving just a Bitcoin ransom note behind. According to users on the BleepingComputer forums, files on their Lenovo Iomega NAS (network attached storage) devices are allegedly being deleted or hidden.
2019-7-30 12:04 | |
Hackers were able to control Tesco’s Twitter account on June 24 and urged followers to send Bitcoin to a wallet address. The hackers promised users that they were going to receive back twice the funds they send.
2019-6-26 00:22 | |
Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions.
2019-6-14 04:03 | |
Security Researcher Uncovers Clever Phishing Attack On Binance Users One of the major issues affecting the cryptocurrency industry and a major hindrance to its popularity is lack of security. Cryptocurrency exchanges have been targeted in hacks that have led to the loss of billions of dollars worth of cryptocurrency. However, it seems the attackers are […]
2019-6-3 22:31 | |
64% of ransomware attackers launder their proceeds through crypto exchanges Attackers are now focusing on larger companies and users Chainalysis, a blockchain analytics firm, informed that 64% of ransomware attackers cash out their funds through crypto exchanges.
2019-6-3 09:31 | |
The purpose of this infographic is to visualize the size of large cryptocurrency hacks that have occurred in the past as if they all happened today. The hacks included in this infographic extend beyond exchanges, as there were other large entities that experienced cryptocurrency hacks, such as marketplaces like Silk Road 2.
2019-5-25 21:56 | |
WhatsApp, the messaging app used by more than 1. 5 billion worldwide, says it’s patched a critical security vulnerability which allowed attackers to secretly infect phones with malicious spyware by just calling phone numbers over an in-app audio call.
2019-5-14 14:18 | |
Global payment processing platform PayPal has been awarded a patent for a technique that can help with the timely detection and reduction of ransomware attacks. Ransomware attacks are a form of malware that takes over the victim's computer, locks up the files therein and demands a ransom before the files can be accessed again — often to be paid in cryptocurrency.
2019-4-19 21:17 | |
This article was originally published by 8btc and written by Lylian Tang. The Chinese security service provider 360 Security has issued a warning that a large number of crypto exchanges have been targeted by the North Korean hacker group Lazarus and that the number is still rising after the recent hacks of crypto exchanges DragonEx, Etbox and BiKi.
2019-4-2 21:54 | |
There have been several hackers that stole users’ spare computing power to mine virtual currencies. Other attackers targeted large websites and injected crypto mining software to steal users’ computing power when they were visiting the site.
2019-3-20 20:01 | |
Most cyberattacks in the crypto space involve hackers finding a way around the security of crypto exchange platforms and gaining access to users’ funds. Last year saw the entry of a new breed of cyber extortionists that seems to be gaining ground, so much so that they were able to steal over $300,000 in bitcoin (BTC) tokens in 2018.
2019-3-1 18:10 | |
As if Bitmain’s year hasn’t been rough enough, having posted big losses and laying off entire departments, its flagship product now has a firmware vulnerability. A few weeks ago, Bitcoin Core contributor James Hilliard discovered an exploit in Bitmain’s S15 firmware.
2019-2-21 23:44 | |
A couple of dutiful hackers have been hijacking thousands of Google’s Chromecast streaming dongles to warn users that the devices can be taken over, and remotely forced to play any YouTube video the attackers’ choose, reports TechCrunch.
2019-1-3 10:31 | |
In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack.
2019-1-1 19:15 | |
In order to help more people understand “the other Casper” (Vlad Zamfir’s CBC Casper), and specifically the instantiation that works best for blockchain protocols, I thought that I would write an explainer on it myself, from a less abstract and more “close to concrete usage” point of view.
2018-12-6 04:03 | |
Quora announced today that its Q&A platform was breached by hackers on November 30, and that approximately 100 million users’ data was compromised. The attackers are believed to have accessed the following information: Account information, e.
2018-12-4 07:49 | |
It appears Twitter has become so saturated with cryptocurrency scams that attackers are finally starting to target other platforms too – like Facebook. Unlike the standard Bitcoin giveaway scams on Twitter, the Facebook scam (as noticed by Hard Fork) is designed to trick users into giving up sensitive data, like their credit card information.
2018-11-28 17:48 | |
A newly discovered vulnerability on Ethereum allowing for malicious GasToken Minting was found. The development team already acknowledged the issue and informed most of the affected users on November 13, 2018, via private disclosure.
2018-11-24 18:00 | |
Hackers were able to seize control of the email address of cryptocurrency exchange Uphold – and blast its users with a link to a Bitcoin (BTC) giveaway scam. Fraudsters sent links to a phishing campaign, designed to dupe investors out of their coins.
2018-11-24 12:17 | |
It appears hackers were able to seize control of the email address of cryptocurrency exchange desk Uphold – and blast its users with a link to a Bitcoin giveaway scam. Scammers sent links to a phishing campaign, designed to dupe naive investors out of their coins.
2018-11-22 16:41 | |
A bug centering around a new Ethereum token, GasToken, which was enabling abuse on cryptocurrency exchanges, appears to have been resolved. The details are provided in a report originally published on November 13, 2018, that discussed how the bug was exploited by attackers, and what digital platforms could do if they wished to protect their hot wallet funds.
2018-11-22 00:34 | |
In the latest in a string of cryptocurrency-related hackings on Twitter, attackers have breached an official Google account to promote a Bitcoin giveaway scam to its over 800,000 followers. The official G Suite Twitter account just blasted the following message to hundreds of thousands of users: Hard Fork has yet to confirm for how long the tweet remained on G Suite’s feed, but it was no less than 11 minutes (as you can notie on the screenshot.
2018-11-14 22:40 | |
Despite Google’s hardline stance against malicious cryptocurrency apps, some still find ways of sneaking through its net. Security and malware researcher, Lukas Stefanko, published a video yesterday exposing how a malicious app, distributed via Google’s Play Store, steals the sensitive data from unsuspecting users.
2018-11-2 17:55 | |
On October 25, 2018, the privacy-centric cryptocurrency wallet Samourai warned users via Twitter of a new type of tracking tactic called a “dusting attack. ” Biting the Dust According to tweets, the attack is an attempt to compromise the security and privacy of Samourai users by using “coin dust” to deanonymize users and linking their transactional inputs together.
2018-10-27 18:00 | |
On October 7, 2018, Reddit user team-periwinkle took to social media, questioning cryptocurrency users for their interest in a potential 51% attack. While attackers would not typically announce their intentions publicly, the purpose of the attack would be for education, as the entire process will be live-streamed to allow anyone interested in learning how the often purely theoretical process works.
2018-10-13 01:00 | |
Facebook today revealed more information about the September data breach that potentially affected up to 50 million users. Now we know roughly what information the attackers accessed, and the number of people they had access to — as well as a help service for those who were effected.
2018-10-13 21:42 | |
Another day, another cryptocurrency hack. Notorious blockchain startup SpankChain has temporarily taken down its adult streaming platform after attackers exploited its smart contracts to steal $38,000 worth of Ethereum.
2018-10-9 17:58 | |
The latest news out of Facebook this week is that the social network has been subject to yet another mass data hack, one that calls into question once again the integrity of users data on Facebook.
2018-10-3 12:30 | |
Based on blockchain technology, most cryptocurrencies have an open and public ledger of transactions. While this is required for these system to work, it comes with a significant downside: privacy is often quite limited.
2018-9-25 19:47 | |
Several Chinese researchers from Fudan University, Tsinghua University and the University of California Riverside have produced the first systematic study of the malicious mining of cryptocurrencies, known as cryptojacking, unveiling increasing complexity over time.
2018-9-25 23:59 | |
In the last years, we have seen how different attackers targeted crypto exchanges, users and investors. Just in 2017, cyber attacks caused $275 million dollars in damages to businesses according to Equifax.
2018-9-13 18:14 | |
Here we go again with more EOS troubles: the popular cryptocurrency purportedly suffers from a major vulnerability that makes it possible to steal valuable network resources directly from user accounts – without any authorization.
2018-8-27 14:24 | |
Until just a few days ago, the interface of the betting market Augur was compromised in a way that could have allowed attackers to replace every bit of information on the platform—and users would not have been able to tell the difference.
2018-8-9 06:35 | |