Tag: cryptocurrencies
‘Illegal Crypto Mining is a Huge Drain on a Nation’s Power...
Hackers and ransomware groups have benefitted immensely by leveraging blockchain and cryptocurrencies to secure multi-million-dollar payouts. Cryptocurrency transactions are untraceable and not regulated by...
Crypto.com Suffers Unauthorized Activity Affecting 483 Users
Cryptocurrency exchange platform Crypto.com announced that unknown threat actors compromised its user accounts. In an official release, the company stated that a small number...
North Korean Lazarus Group Stole $400 M Worth of Cryptocurrencies in...
Several organizations started the New Year globally with hacker intrusions and data breaches, but few cybercriminal groups benefitted from their malicious activities. A recent...
WatchDog Cryptojacking Campaign Running for Over Two Years
Cyberattacks on cryptocurrency exchanges and crypto wallets have become rampant as cybercriminals often target cryptocurrencies, whose net-worth is increasing day by day. Numerous hacks...
U.K’s Crypto Exchange EXMO Halted Operations After DDoS Attack
The high net-worth of cryptocurrencies attracts both investors and cybercriminals. As a result, numerous hacks and heists have been reported on cryptocurrency exchanges. EXMO,...
SIM Swappers Detained for Stealing $100Mn in Cryptocurrencies from Celebrities
Eight cybercriminals have been arrested in England and Scotland for their involvement in a series of SIM Swapping attacks by hijacking phone numbers of...
German Police Seize $60 Mn of Bitcoin from a Scammer who...
A strong password habit of a fraudster is keeping the German prosecutors at bay. According to a report, the German police have seized over...
Operation Egypto: U.S. and Brazil Seize $24 Mn in Cryptocurrency
Law enforcement authorities from the U.S. and Brazil seized $24 million in cryptocurrency that was procured via online fraud. According to the Department of...
McAfee Report Predicts 2020 to be Year of Mobile Sneak Attacks
McAfee released its Mobile Threat Report 2020, which found that hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target...
New Rogue Cryptomining Techniques and Cases
It’s common knowledge that new cryptocurrency units come into existence through mining, a process of complex computation relying on CPU or GPU power. Unfortunately,...