A still unidentified hacker or group of hackers has and is always adding new relay servers to the Tor network as part of a cyber-attack campaign within the Dark Web that uses SSL Stripping that targets the users of the Tor browser and Tor relays. This kind of technology being used is known as a...Continue Reading
Multiple high-profile and verified Twitter accounts were hacked on Wednesday by Cybercriminals that used the official accounts to spread a Cryptocurrency scam. The post lures the followers of high-profile accounts to send payment to a BTC Address within 30 minutes and “as payback” they will have the money back double in value – a common...Continue Reading
Canada’s leading cryptocurrency platform hacked? Coinsquare is widely considered as Canada’s foremost platform for cryptocurrency exchange. The organization is one of the world’s leading cryptocurrency company for most known digital currencies. As a regulated exchange body of Canada’s FINTRAC (Financial Transactions and Reports Analysis Centre), Coinsquare was able to obtain a reliable and exclusive business...Continue Reading
RubyGems have discovered a new threat between February 16 to 25 of this year. As one of the known repositories of open source code for developers. The company announced that they were able to extract 700 malicious or rude codes as part of their malware detection program. The code, once included on a software package,...Continue Reading
Stemming from several reports from several security researchers, there’s a new cryptominer called The Bird Miner. It targets Apple Mac systems through an ‘Ableton Live 10’ torrent. The music production software costs several hundred US dollars, so many people are on the look for cracked versions that they can download without paying a dime. However,...Continue Reading
Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps in the Google Play store that have been downloaded over 1,000 times. The two fraudulent apps are “Trezor Mobile Wallet” and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether,” and security researchers note that both apps share an “overlap in code and interface.” The fake Trezor...Continue Reading
Ransomware and Cryptocurrency mining attacks have been very frequent since last year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature...Continue Reading
We detected a cryptobot malware that uses multiple propagation and infection methods to drop a Monero cryptocurrency miner onto as many systems and servers as possible. Initially observed in China in early 2019, the methods it previously used to infect networks involved accessing weak passwords and using pass-the-hash technique, Windows admin tools, and brute force...Continue Reading
A malware researcher and a twitter user Fumik0_ has discovered a new website that is spreading crypto malware. This fake cryptocurrency trading website is masquerading as a legitimate service that delivers crypto-stealing malware trojan known as Vidar. This malware trojan is distributed through a site that impersonates CryptoHopper trading platform which allows users to build...Continue Reading
Security researchers discovered a security vulnerability in Oracle WebLogic Server, a component of Oracle Fusion Middleware, and found to be actively exploited by cybercriminals to install cryptocurrency miners. This malware which was used in the attack hid in certificate files to avoid malware detection and later dropped miners for cryptocurrency known as Monero Miner. Tracked...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.