Cryptocurrency Blog News(60)  - 2024  2023  2022  2021  2020  2019  2018

AI blog  APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog  2024  2023

DATE

NAME

Info

CATEG.

WEB

19.4.25 SCAMONOMICS THE DARK SIDE OF STOCK & CRYPTO INVESTMENTS IN INDIA EXECUTIVE SUMMARY At CYFIRMA, we are committed to offering up-to-date insights into prevalent threats and tactics employed by malicious actors targeting both organizations Cryptocurrency blog Cyfirma
19.4.25 Cybersecurity Stop of the Month: Bitcoin Scam—How Cybercriminals Lure Victims with Free Crypto to Steal Credentials and Funds In recent years, cryptocurrency has grown from a niche interest into a mainstream financial ecosystem. This evolution, however, hasn’t been without drawbacks. Namely, it has attracted cybercriminals who use the allure of digital wealth to perpetrate sophisticated fraud schemes. In 2023, illicit crypto addresses received at least $46.1 billion, up from $24.2 billion. This underscores how rapidly crypto-related crimes are spreading. Cryptocurrency blog PROOFPOINT

22.3.25

GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Updated March 20: The recent compromise of the GitHub action tj-actions/changed-files and additional actions within the reviewdog organization has captured the attention of the GitHub community, marking another major software supply chain attack. Our team conducted an in-depth investigation into this incident and uncovered many more details about how the attack occurred and its timeline. Cryptocurrency blog Palo Alto

15.3.25

Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims

Unit 42 researchers discovered a campaign distributing thousands of fraudulent cryptocurrency investment platforms ​​via websites and mobile applications.

Cryptocurrency blog

Palo Alto

22.2.25

Russian Threat Group CryptoBytes is Still Active in the Wild with UxCryptor The SonicWall Capture Labs threat research team has recently been analyzing malware from the CryptoBytes hacker group. UxCryptor is a ransomware strain associated with the CryptoBytes group, a financially motivated Russian cybercriminal organization. It has been active since at least 2023. The group is known for leveraging leaked ransomware builders to create and distribute their malware. Cryptocurrency blog

SonicWall

22.2.25

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe

Cryptocurrency blog

Eset

11.1.25

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe Cryptocurrency blog

Eset

2.11.24

Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach In this blog entry, we discuss how malicious actors are exploiting Docker remote API servers via gRPC/h2c to deploy the cryptominer SRBMiner to facilitate their mining of XRP on Docker hosts. Cryptocurrency blog

Trend Micro

28.9.24

Wallet Scam: A Case Study in Crypto Drainer TacticsCheck Point Research (CPR) uncovered a malicious app on Google Play designed to steal cryptocurrency marking the first time a drainer has targeted mobile device users exclusively. The app used a set of evasion techniques to avoid detection and remained available for nearly five months before being removed.Cryptocurrency blogCheckpoint

20.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 2In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise.Cryptocurrency blogTrend Micro

13.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 2In 2023, the cryptocurrency industry faced a significant increase in illicit activities, including money laundering, fraud, and ransomware attacks. Ransomware attacks were especially prevalent and profitable for attackers. However, other forms of criminal activity also saw a rise. Cryptocurrency blogTrend Micro

13.7.24

An In-Depth Look at Crypto-Crime in 2023 Part 1Cybersecurity is a growing concern in today's digital age, as more sensitive information is stored and transmitted online. With the rise of cryptocurrencies, there has also been a rise in crypto-crimes, which pose a significant threat to the security of both individuals and businesses. Cryptocurrency blogTrend Micro

13.7.24

How do cryptocurrency drainer phishing scams work?In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials.Cryptocurrency blogCisco Blog

6.7.24

Turning Jenkins Into a Cryptomining Machine From an Attacker's PerspectiveIn this blog entry, we will discuss how the Jenkins Script Console can be weaponized by attackers for cryptomining activity if not configured properly.Cryptocurrency blogTrend Micro
29.6.24Examining Water Sigbin's Infection Routine Leading to an XMRig CryptominerWe analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner. Cryptocurrency blogTrend Micro
29.6.24We’re not talking about cryptocurrency as much as we used to, but there are still plenty of scammers out thereA report in March found that 72% of cryptocurrency projects had died since 2020, with crypto trading platform FTX’s downfall taking out many of them in one fell swoop.Cryptocurrency blogCisco Blog

18.5.24

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gainOne of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theftCryptocurrency blogEset
20.4.24Bitcoin scams, hacks and heists – and how to avoid themHere’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safeCryptocurrency blogEset
23.3.24ETHEREUM’S CREATE2: A DOUBLE-EDGED SWORD IN BLOCKCHAIN SECURITYEthereum’s CREATE2 function is being exploited by attackers to compromise the security of digital wallets, bypassing traditional security measures and facilitating unauthorized access to funds.Cryptocurrency blogCheckpoint

14.1.24

Lessons from SEC's X account hack – Week in security with Tony AnscombeThe cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFsCryptocurrency blogEset