Tag: Crypto

Researchers Warn of Crypto Scam Apps on Apple App Store
Events, Risk, Security

Researchers Warn of Crypto Scam Apps on Apple App Store

The first "cryptorom" scam applications, according to security experts, have been found that managed to go past Apple's rigorous App Store testing procedures. Ace Pro and MBM BitScan, the two programs in question, were also found on Google Play. Users will be alarmed by their appearance in the App Store, which is often subject to tougher security regulations. According to Sophos, the apps are also resistant to Apple's Lockdown mode, which is intended to shield users from sophisticated social engineering. Malware generally has a difficult time navigating the Apple App Store's security screening procedure. Because of this, when we first started looking into cryptorom schemes aimed against iOS users the con artists would have to convince consumers to first read the complete article ...
FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft
Risk, Security

FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft

The loss of $100 million in cryptocurrency assets from Harmony Horizon Bridge in June 2022 was confirmed by the American Federal Bureau of Investigation (FBI) on Monday. The Lazarus Group and APT38 (also known as BlueNoroff, Copernicium, and Stardust Chollima), a state-sponsored threat group from North Korea that specializes in financial cyber operations, were both blamed by the law enforcement agency for the hack. The FBI added that the TraderTraitor attack campaign, which was made public by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in April 2022, was used by the Harmony infiltration. The strategy involved using social engineeri...
New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner
Risk, Security

New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner

On infected systems, a new Linux malware that was created with the help of the shell script compiler (shc) has been seen installing a cryptocurrency miner. According to a study released today by AhnLab Security Emergency Response Center (ASEC), "it is suspected that following successful authentication using a dictionary attack on poorly managed Linux SSH servers, various viruses were installed on the target machine." Shell scripts can be easily translated into binaries with the help of shc, providing security against unwanted source code alterations. It is comparable to Windows' BAT2EXE application, which can turn any batch file into an executable read the complete article New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner.
Will the Crypto Crash Impact Cybersecurity in 2023?
Reputation, Resources, Risk, Security

Will the Crypto Crash Impact Cybersecurity in 2023?

One of the obvious issues for individuals in the cybersecurity industry is how this quick decrease in cryptocurrency valuations will impact the cybercrime economy, especially with the implosion of the FTX exchange placing a punctuation point on the cryptocurrency crash of 2022. Cybercriminals have utilized and misused cryptocurrency to expand their empires during the most recent cryptocurrency boom and even earlier. Ransomware's extortionate distribution channel is the cryptocurrency market, which is also a haven for consumer-targeted schemes aimed at stealing their wallets and accounts. In the past, it has offered a lot of anonymous cover for money laundering at the heart of a variety of cybercrime operations read the complete article Will the Crypto Crash Impact Cybersecurity in ...
Do You Need to Invest in All Meme Tokens to Become Rich? (1) CoinGecko’s API Free Data Problem
Risk

Do You Need to Invest in All Meme Tokens to Become Rich? (1) CoinGecko’s API Free Data Problem

CoinGecko.com is a gateway to explore cryptocurrency data. It’s catchy and worth making your next good friend if you are interested in crypto. For quants and field researchers their API could be a plug into stream of real-time crypto-market data accessed via a number of clients (e.g. C++, NodeJs, R, Python, Java, Ruby, etc.). CoinGecko’s free API has a rate limit of 50 calls/minute. If you need to fetch data more frequently, you have three paid plans to choose from. Let’s focus for a moment on what you can get for free if you’re a Python user. Say, our project is expressed by the title of this article and you are a newbie to the crypto-world seeking for a quick way to download some data and perform calculations. What do you need? For sure it would be a list of all Meme Tokens. It w...