HackDig : Dig high-quality web security articles for hackers

BlockFi Hacked Following SIM Swap Attack, But Says No Funds Lost

For just under 90 minutes last Thursday, hackers were able to compromise the systems of cryptocurrency lending platform BlockFi, and gain unauthorised access to users’ names, email addresses, dates of birth, address and activity history.In an incident report published on its website, BlockFi was keen to stress that the hacker’s activity had been
Publish At:2020-05-24 09:49 | Read:71 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cryptocurr

US offers up to $5m reward for information on North Korean hackers

byLisa VaasKnow anything about North Korean hackers and their activities in cyberspace, past or ongoing?The US on Wednesday said that it’s got up to $5 million in Rewards for Justice money if you cough up useful details, which you can do here.The FBI and the Departments of State, Treasury, and Homeland Security (DHS) put out an advisory about the persi
Publish At:2020-04-17 07:07 | Read:320 | Comments:0 | Tags:Cryptocurrency Government security Law & order Security thre

49 malicious Chrome extensions caught pickpocketing crypto wallets

byLisa VaasGoogle has kicked 49 malicious Chrome browser extensions out of its Web Store that were posing as cryptocurrency wallets in order to drain the contents of bona fide wallets. The extensions were discovered by researchers from MyCrypto – an open-source interface for the blockchain that helps store, send and receive cryptocurrency – and
Publish At:2020-04-16 07:57 | Read:425 | Comments:0 | Tags:Cryptocurrency Data loss Google Google Chrome Malvertising M

Cryptojacking is almost conquered – crushed along with coinhive.com

byDanny BradburyCryptojacking may not be entirely dead following the shutdown of a notorious cryptomining service, but it isn’t very healthy, according to a paper released this week.Cryptomining websites embed JavaScript code that forces the user’s browser to begin mining for cryptocurrency. The digital asset of choice is normally Monero, which i
Publish At:2020-03-19 08:57 | Read:379 | Comments:0 | Tags:Cryptocurrency Security threats Web Browsers CoinHive crypto

From Nigerian Princes to Bitcoin Trading: Online Scams Have Come a Long Way

It would be a challenge to find someone who has not heard of the now-infamous “Nigerian Prince scams,” also known as “419 scams” and “advance-fee scams.” The concept itself dates back to the French Revolution, but it has come a long way due to human gullibility. More recently, it has taken to the internet to deceive scores
Publish At:2020-03-09 07:28 | Read:435 | Comments:0 | Tags:Fraud Protection Bitcoin Cryptocurrency Fraud Malicious Doma

Chrome extension cons cryptocurrency users out of hardware wallet key

byDanny BradburyCryptocurrency security company Ledger has warned users about a rogue Chrome extension that dupes its victims into giving up the keys to their crypto wallets.Cryptocurrency owners need a wallet just like users of regular cash do. Instead of cash, however, crypto wallets hold digital keys – which grant users access to the blockchain addr
Publish At:2020-03-06 08:12 | Read:516 | Comments:0 | Tags:Cryptocurrency Security threats Blockchain chrome Chrome ext

Police bust alleged operator of Bitcoin mixing service Helix

byLisa VaasThe guy who allegedly wanted to be the Dark Net’s “go-to” money launderer by acting as a “Bitcoin mixer” – soliciting cryptocurrency from crooks, slicing and dicing the coins, and then remixing them in an ultimately futile attempt to obscure their source – has been busted.The US Department of Justice (DOJ) announced on Thursday t
Publish At:2020-02-17 07:49 | Read:540 | Comments:0 | Tags:Cryptocurrency Law & order AlphaBay bitcoin Bitcoin mixer Bi

Cryptocurrency 101 – Part 1: Blockchain and basic concepts

This is the first in a series of articles exploring Bitcoin, cryptocurrencies and their fundamental technologies, and how you might find these technologies useful and use them safely.You’ve likely heard about Bitcoin, which is a type of cryptocurrency or digital currency, and perhaps you’ve wondered what all the fuss is about. What exactly are Bi
Publish At:2020-02-15 14:02 | Read:290 | Comments:0 | Tags:Random cryptocurrency

Fintech security: the challenges and fails of a new era

“I have no idea how this app from my bank works, and I don’t trust what I don’t understand.” Josh is not an old curmudgeon or luddite. He’s 42 with a decent understanding of technology. Nevertheless, the changes in fintech have come too fast for him. It’s not that he doesn’t trust his bank. He doesn’t trust him
Publish At:2020-02-05 16:55 | Read:470 | Comments:0 | Tags:Vital infrastructure cryptocurrency finacials fintech gdpr g

(Almost) Hollow and Innocent: Monero Miner Remains Undetected via Process Hollowing

By Arianne Dela Cruz, Jay Nebre and Augusto Remillano II As the value of cryptocurrencies increased (after a short dip in 2018), we observed increased activity from cryptocurrency mining malware this year, particularly infections and routines involving Monero miners. Over a span of a few months, we came across an infection routine that exploited vulnerabilit
Publish At:2019-12-12 14:35 | Read:1131 | Comments:0 | Tags:Bad Sites Malware cryptocurrency cryptominer Monero process

New Sextortion Scam Uses Alternative Cryptocurrencies to Evade Detection

A new sextortion scam variant is using a wallet for a cryptocurrency other than bitcoin in an attempt to evade detection.On October 8, Cofense revealed it had detected a modified sextortion scam that was using a wallet address for Litecoin instead of bitcoin.The variant thereby differentiated itself from earlier sextortion campaigns detected by the anti-phis
Publish At:2019-10-18 10:10 | Read:870 | Comments:0 | Tags:IT Security and Data Protection Latest Security News cryptoc

Cyber News Rundown: Cryptomining WAV Files

Reading Time: ~ 2 min. Cryptominers Found in Audio Files Researchers have recently found that both cryptominers and backdoors are being deployed within WAV audio files on targeted systems. Using steganography, attackers can include components for both loading and executing malicious scripts, while still allowing some audio files to play normally. Along wi
Publish At:2019-10-18 08:10 | Read:947 | Comments:0 | Tags:Industry Intel cryptocurrency

Facebook’s Libra cryptocurrency dealt blow by PayPal’s departure

byJohn E DunnHas PayPal just dealt a body blow to Facebook’s Libra cryptocurrency?In emails sent to journalists last week, the company abruptly announced that it was leaving the Libra Association, the 28-strong organisation of global companies and non-profits, including Facebook, set up to oversee its roll out.Given that Libra was only announced in June, wit
Publish At:2019-10-08 05:45 | Read:1132 | Comments:0 | Tags:Cryptocurrency Facebook Social networks cryptocurrency Libra

Threat actors using default SSH credentials to hijack Ethereum miners

Attackers scanned for the entire IPv4 range and look for Ethereum miners with open SSH connections. Hackers target Ethereum-mining farms in the attempt to hijack the funds by replacing the user’s wallet with their one. The attacks were first spotted on Monday, threat actors attempted to change the default configuration of Ethereum miners. “Illicit digi
Publish At:2017-11-03 08:40 | Read:4504 | Comments:0 | Tags:Breaking News Hacking cryptocurrency Cybercrime Ethereum min

The Blockchain Is Only as Strong as Its Weakest Link

This is the first installment in a three-part series. Blockchain-based applications will revolutionize the way people and organizations interact with each other and the Internet of Things (IoT) — and rightfully so. Based on the foundational principles of trust, blockchain has the potential to solve real-life business challenges within every sector. Permissio
Publish At:2017-10-27 14:00 | Read:3955 | Comments:0 | Tags:Banking & Financial Services Data Protection Blockchain Cryp


Share high-quality web security related articles with you:)


Tag Cloud