HackDig : Dig high-quality web security articles for hacker

Cybercrime’s Cryptocurrency Gold Rush: Going Strong!

What’s the connection between cybercrime and cryptocurrencies? Perhaps it would suffice to say that the reasons for criminals adopting the cryptocoin are quite obvious. But when did this all start, and what fuels it and gets fueled in return? This blog will go over some of the historical reasons that connect cybercrime and cryptocurrency as well as exa
Publish At:2017-10-04 21:35 | Read:311 | Comments:0 | Tags:Fraud Protection Threat Intelligence Bitcoin Bitcoin Mining

Building Digital Trust, One Blockchain at a Time

Since it first appeared in 2009, the bitcoin network has grown significantly. The digital currency’s recent surge in value has sparked discussions within the security space about the benefits of blockchain, a technology that promotes the type of trust that is sorely lacking in some digital transactions. Today, people are exchanging real money for cryp
Publish At:2017-09-22 13:40 | Read:254 | Comments:0 | Tags:Banking & Financial Services Authentication Bitcoin Blockcha

Was Torrent Site The Pirate Bay Being Sneaky or Creative By Tricking Visitors Into Monero Mining

Users noticed a cryptocurrency miner surfaced on The Pirate Bay, the world’s largest torrenting for a day over the weekend. Pop quiz: would you rather A) see ad banners displayed at the top of the website, or B) mine Monero cryptocurrency when you visit a website? Judging by the number of downloads for ad blocking browser extensions, no one likes banner ads.
Publish At:2017-09-19 13:05 | Read:427 | Comments:0 | Tags:Breaking News Hacking Security Bitcoin miner Monero Pirate B

Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues

Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet and steal funds. In June 2016, researchers with Positive Technologies demonstrated that it is possible to hack Facebook accounts by knowing phone numbers by exploiting a flaw in the SS7 protocol. The technique allows bypassing any securi
Publish At:2017-09-19 13:05 | Read:309 | Comments:0 | Tags:Breaking News Hacking Bitcoin mobile SS7 two-factor authenti

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks. According to IBM Managed Security Services (MSS) data,
Publish At:2017-09-19 12:00 | Read:301 | Comments:0 | Tags:Advanced Threats Security Services Threat Intelligence X-For

Satoshi Bomb

Let us discuss what defines the profitability of bitcoin mining, what principles for mining speed adaptation were initially embedded into it, and why these principles can lead to the failure of the cryptocurrency in the long run. We assume that the reader has an idea of basic Bitcoin mechanics such as blockchains, mining, mining pools, and block rewards. Not
Publish At:2017-09-07 14:50 | Read:403 | Comments:0 | Tags:Opinions Bitcoin Cryptocurrencies

Cerber Ransomware Evolves Again, Now Steals From Bitcoin Wallets

By Gilbert Sison and Janus Agcaoili Cerber ransomware has acquired the reputation of being one of the most rapidly evolving ransomware families to date. Just in May, we pointed out how it had gone through six separate versions with various differences in its routines. Several months later and it seems to have evolved again, this time adding cryptocurrency th
Publish At:2017-08-03 14:25 | Read:462 | Comments:0 | Tags:Malware Ransomware bitcoin CERBER ransomware

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin

Greek Police arrested a Russian man and accused him of running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the cryptocurrency. Greek Police have arrested the Russian national Alexander Vinnik (38) and they accuse the man of running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the cryptocurrency. The police seized two la
Publish At:2017-07-28 04:35 | Read:381 | Comments:0 | Tags:Breaking News Cyber Crime Bitcoin BTC-e Bitcoin exchange Mt.

After AlphaBay’s Demise, Customers Flocked to Dark Market Run by Dutch Police

Earlier this month, news broke that authorities had seized the Dark Web marketplace AlphaBay, an online black market that peddled everything from heroin to stolen identity and credit card data. But it wasn’t until today, when the U.S. Justice Department held a press conference to detail the AlphaBay takedown that the other shoe dropped: Police in The N
Publish At:2017-07-21 06:30 | Read:681 | Comments:0 | Tags:Other Alexandre Cazes AlphaBay Andrew McCabe Bitcoin dark ma

Is Blockchain the Key to Stopping Ransomware Attacks?

We all remember the devastating WannaCry ransomware attack that struck organizations around the world in May 2017. The attack spread at a rate of almost 3,600 computers per hour, or about one per second. When all was said and done, the ransomware infected more than 300,000 devices. Many victims simply paid the ransom to retrieve their locked files. This only
Publish At:2017-07-13 23:10 | Read:414 | Comments:0 | Tags:Fraud Protection Best Practices Bitcoin Blockchain Cryptocur

Bithumb, the fourth largest Bitcoin exchange has been hacked

Bithumb, one of the world’s largest Bitcoin and Ether crypto currencies exchanges, has been hacked. Over $1 Million worth Bitcoin and Ether stolen. Bithumb, one of the world’s largest Bitcoin and Ether crypto currencies exchanges, has been hacked. The hackers have stolen more than $1 Million in crypto currencies from the accounts of several users
Publish At:2017-07-05 13:45 | Read:792 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking Bitcoin Bithum

‘Petya’ Ransomware Outbreak Goes Global

A new strain of ransomware dubbed “Petya” is worming its way around the world with alarming speed. The malware is spreading using a vulnerability in Microsoft Windows that the software giant patched in March 2017 — the same bug that was exploited by the recent and prolific WannaCry ransomware strain. The ransom note that gets displayed on s
Publish At:2017-06-28 06:00 | Read:529 | Comments:0 | Tags:Other Bitcoin DLA Piper Eternal Blue Group-IB ICSI ISACA Leg

Funny Money: Exploring the Connection Between Bitcoin and Ransomware

After the WannaCry attack, no fewer than five threat research companies pounced on the fact that the ransomers were demanding to be paid in bitcoin. However, they completely glossed over the concept behind the malware itself. Within days, theorists came out of the woodwork to characterize the attack as some kind of subtle terrorist or government-backed opera
Publish At:2017-06-27 20:30 | Read:435 | Comments:0 | Tags:Data Protection Fraud Protection Bitcoin Black Market Crypto

Following the Money Hobbled vDOS Attack-for-Hire Service

A new report proves the value of following the money in the fight against dodgy cybercrime services known as “booters” or “stressers” — virtual hired muscle that can be rented to knock nearly any website offline. Last fall, two 18-year-old Israeli men were arrested for allegedly running vDOS, perhaps the most successful booter s
Publish At:2017-06-06 18:20 | Read:456 | Comments:0 | Tags:Other attack years Bitcoin booter Hackforums New York Univer

WannaCry Ransomware Spreads Across the Globe, Makes Organizations Wanna Cry About Microsoft Vulnerability

On Friday, May 12, 2017, the world was alarmed to discover that cybercrime had achieved a new record. In a widespread ransomware attack that hit organizations in more than 100 countries within the span of 48 hours, the operators of malware known as WannaCry/WanaCrypt0r 2.0 are believed to have caused the biggest attack of its kind ever recorded. Perhaps more
Publish At:2017-05-14 19:35 | Read:1523 | Comments:0 | Tags:Advanced Threats Fraud Protection Incident Response Malware

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud