Cryptocurrency Blog 2024- 2026  2025  2024  2023  2022  2021  2020  2019  2018

AI blog  APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

2.11.24

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. Cryptocurrency blog

Trend Micro

28.9.24

Wallet Scam: A Case Study in Crypto Drainer Tactics Check Point Research (CPR) uncovered a malicious app on Google Play designed to steal cryptocurrency marking the first time a drainer has targeted mobile device users exclusively. The app used a set of evasion techniques to avoid detection and remained available for nearly five months before being removed. Cryptocurrency blog Checkpoint

20.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 2 In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. Cryptocurrency blog Trend Micro

13.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 2 In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. Cryptocurrency blog Trend Micro

13.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 1 Cybersecurity is a growing concern in today's digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals and businesses. Cryptocurrency blog Trend Micro

13.7.24

How do cryptocurrency drainer phishing scams work? In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials. Cryptocurrency blog Cisco Blog

6.7.24

Turning Jenkins Into a Cryptomining Machine From an Attacker's Perspective In this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly. Cryptocurrency blog Trend Micro
29.6.24 Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. Cryptocurrency blog Trend Micro
29.6.24 We’re not talking about cryptocurrency as much as we used to, but there are still plenty of scammers out there A report in March found that 72% of cryptocurrency projects had died since 2020, with crypto trading platform FTX’s downfall taking out many of them in one fell swoop. Cryptocurrency blog Cisco Blog

18.5.24

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft Cryptocurrency blog Eset
20.4.24 Bitcoin scams, hacks and heists – and how to avoid them Here’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safe Cryptocurrency blog Eset
23.3.24 ETHEREUM’S CREATE2: A DOUBLE-EDGED SWORD IN BLOCKCHAIN SECURITY Ethereum’s CREATE2 function is being exploited by attackers to compromise the security of digital wallets, bypassing traditional security measures and facilitating unauthorized access to funds. Cryptocurrency blog Checkpoint

14.1.24

Lessons from SEC's X account hack – Week in security with Tony Anscombe The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFs Cryptocurrency blog Eset