Tag: crypto
-
Prepping for the quantum threat requires a phased approach to crypto agility
Tags: access, ceo, ciso, computing, crypto, cryptography, cybersecurity, encryption, firmware, government, Hardware, identity, network, nist, open-source, software, supply-chain, threat, tool, vulnerabilityMissing pieces: Michael Smith, field CTO at DigiCert, noted that the industry is “yet to develop a completely PQC-safe TLS protocol.””We have the algorithms for encryption and signatures, but TLS as a protocol doesn’t have a quantum-safe session key exchange and we’re still using Diffie-Hellman variants,” Smith explained. “This is why the US government in…
-
Industry experts warn crypto infrastructure is ‘creaking’
A new report from experts at HSBC, Thales and InfoSec Global claims decades-old cryptographic systems are failing, putting businesses at risk from current vulnerabilities and the threat from quantum computing First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628242/Industry-experts-warn-crypto-infrastructure-is-creaking
-
JSCEAL-Malware: Wie Hacker Krypto-Wallets plündern
Eine ausgeklügelte Malware-Kampagne namens JSCEAL nimmt derzeit Nutzer von Kryptowährungen ins Visier. Über gefälschte Werbeanzeigen gelingt es den Angreifern, raffiniert entwickelten Schadcode auf die Geräte ihrer Opfer zu bringen, ohne dass viele herkömmliche Virenschutzsysteme ihn erkennen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/jsceal-malware-krypto-wallets
-
JSCEAL-Malware bedroht Nutzer von Krypto-Währungen im großen Stil
Sicherheitsforscher von Check Point Software Technologies sind einer weiteren Attacke gegen Krypto-Währungen auf die Spur gekommen. Betrügerische Werbeanzeigen über Social-Media, die sich als vermeintliche Apps und Finanzdienstleister ausgeben, sollen Nutzer in die Falle locken. Die Kampagne läuft erfolgreich, vor allem in der Europäischen Union, mit über 35000 verseuchten Werbeanzeigen. Die Hacker-Kampagne hört auf den Namen…
-
FBI seizes $2.4M in Bitcoin from new Chaos ransomware operation
FBI Dallas has seized almost 23 Bitcoins from a cryptocurrency address belonging to a Chaos ransomware member that is linked to cyberattacks and extortion payments from Texas companies. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-seizes-24m-in-bitcoin-from-new-chaos-ransomware-operation/
-
Unveiling the Lumma Password Stealer Attack: Infection Chain and Escalation Tactics Exposed
Lumma, a sophisticated C++-based information stealer, has surged in prevalence over recent years, posing significant risks to both individuals and organizations by exfiltrating sensitive data such as browser credentials, cryptocurrency wallets, and personal files. Developed since December 2022 and distributed as Malware-as-a-Service (MaaS) via Telegram channels with tiered subscriptions, Lumma relies on initial access brokers…
-
FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang
The federal government has applied for forfeiture of the funds, which were seized by FBI Dallas in April 2025 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fbi-seizes-crypto-chaos-ransomware/
-
âš¡ Weekly Recap, SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More
Some risks don’t breach the perimeter”, they arrive through signed software, clean resumes, or sanctioned vendors still hiding in plain sight.This week, the clearest threats weren’t the loudest”, they were the most legitimate-looking. In an environment where identity, trust, and tooling are all interlinked, the strongest attack path is often the one that looks like…
-
Darkweb das verkannte Security-Tool
Tags: crypto, cyberattack, cybercrime, exploit, hacker, intelligence, leak, mail, malware, ransomware, service, threat, tool, vulnerability, zero-dayEin Besuch im Darkweb kann der IT-Sicherheit zuträglich sein.Ist vom Darkweb die Rede, weckt das bei den meisten Menschen dunkle Assoziationen von einem florierenden Cyberuntergrund, in dem (unter anderem) mit Waffen, Drogen und Zugangsdaten gehandelt wird. Das trifft zwar durchaus zu allerdings eröffnet das Darkweb Unternehmen, beziehungsweise Security-Spezialisten und -Forschern, auch einige interessante Möglichkeiten, Schaden…
-
Google Forms: Kaspersky warnt vor Missbrauch für Krypto-Scam
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/google-forms-kaspersky-warnung-missbrauch-krypto-scam
-
Milliardenschwere Krypto-Raubzüge: Warum nordkoreanische Hacker so erfolgreich Bitcoin und Ether abgreifen
First seen on t3n.de Jump to article: t3n.de/news/milliardenschwere-krypto-raubzuege-warum-nordkoreanische-hacker-so-erfolgreich-bitcoin-und-ether-abgreifen-1698803/
-
Beware of Fake Error Pages Deploying Platform-Specific Malware on Linux and Windows Systems
Tags: cloud, crypto, cyber, data-breach, exploit, infrastructure, linux, malware, remote-code-execution, scam, service, windowsWiz Research has uncovered an active cryptomining campaign, dubbed Soco404, that exploits misconfigurations in PostgreSQL databases and other cloud services to deploy platform-specific malware on both Linux and Windows systems. This operation, part of a broader crypto-scam infrastructure, leverages opportunistic scanning for exposed services, abusing features like PostgreSQL’s COPY FROM PROGRAM for remote code execution…
-
Hackers Exploit Google Forms to Trick Victims into Stealing Cryptocurrency
Cybercriminals are increasingly using Google Forms to plan cryptocurrency theft in a sophisticated evolution of phishing assaults, taking advantage of the platform’s built-in credibility and smooth integration with Google’s ecosystem. This tactic allows malicious actors to bypass traditional email security filters, delivering deceptive messages directly to victims’ inboxes. By masquerading as legitimate notifications from cryptocurrency…
-
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks
Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners.The threat activity clusters have been codenamed Soco404 and Koske by cloud security firms Wiz and Aqua, respectively.Soco404 “targets both Linux and Windows systems, deploying platform-specific malware,” Wiz First seen on thehackernews.com Jump to article:…
-
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks
Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners.The threat activity clusters have been codenamed Soco404 and Koske by cloud security firms Wiz and Aqua, respectively.Soco404 “targets both Linux and Windows systems, deploying platform-specific malware,” Wiz First seen on thehackernews.com Jump to article:…
-
Quid Miner Launches Mobile Cloud Mining App for Seamless, Secure BTC and DOGE Cryptocurrency Daily Income of $17,777
[London, UK ] July 2025 As digital assets continue to gain mainstream adoption, investors are turning to innovative tools that simplify how they participate in the crypto economy. Quid Miner, a UK-based platform, is leading this shift with a sleek, mobile-first application that enables users across 180+ countries to earn crypto directly from their […]…
-
Scavenger Trojan Targets Crypto Wallets via Game Mods and Browser Flaws
New Scavenger Trojan steals crypto wallet data using fake game mods and browser flaws, targeting MetaMask, Exodus, Bitwarden, and other popular apps. First seen on hackread.com Jump to article: hackread.com/scavenger-trojan-crypto-wallets-game-mods-browser-flaws/
-
Coyote malware is first-ever malware abusing Windows UI Automation
Tags: automation, banking, credentials, crypto, exploit, finance, framework, malware, microsoft, windowsNew Coyote malware uses Windows UI Automation to steal banking credentials, targeting Brazilian users across 75 banks and crypto platforms. Coyote malware is now the first to exploit Microsoft’s UI Automation framework in the wild, validating prior warnings from Akamai researchers in December 2024. The UI Automation (UIA) framework is a Microsoft accessibility framework that…
-
Banking Trojan Coyote Abuses Windows UI Automation
It’s the first known instance of malware that abuses the UIA framework and has enabled dozens of attacks against banks and crypto exchanges in Brazil. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/banking-trojan-coyote-windows-ui-automation
-
Akamai Identifies Coyote Malware Variant Capable of Compromising Microsoft UIA Framework
Akamai researchers today disclosed they have discovered a variant of Coyote malware that extracts specific banking and cryptocurrency exchanges by compromising the UI Automation (UIA) framework developed by Microsoft. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/akamai-identifis-coyote-malware-variant-capable-of-compromising-microsoft-uia-framework/
-
Russia turns to Kyrgyzstan’s booming crypto sector to evade sanctions, researchers say
According to a new report by blockchain intelligence firm TRM Labs, Kyrgyz-registered exchanges have repeatedly been used by sanctioned Russian entities. First seen on therecord.media Jump to article: therecord.media/russia-turns-to-kyrgystan-crypto-sanctions
-
Coyote Trojan First to Use Microsoft UI Automation in Bank Attacks
Coyote Trojan becomes first malware to abuse Microsoft’s UI Automation in real attacks, targeting banks and crypto platforms with stealthy tactics. First seen on hackread.com Jump to article: hackread.com/coyote-trojan-use-microsoft-ui-automation-bank-attacks/
-
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
The threat actor behind the exploitation of vulnerable Craft Content Management System (CMS) instances has shifted its tactics to target Magento CMS and misconfigured Docker instances.The activity has been attributed to a threat actor tracked as Mimo (aka Hezb), which has a long history of leveraging N-day security flaws in various web applications to deploy…
-
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
The Windows banking trojan known as Coyote has become the first known malware strain to exploit the Windows accessibility framework called UI Automation (UIA) to harvest sensitive information.”The new Coyote variant is targeting Brazilian users, and uses UIA to extract credentials linked to 75 banking institutes’ web addresses and cryptocurrency exchanges,” Akamai security researcher Tomer…
-
Indian crypto exchange CoinDCX confirms $44M stolen during hack
The crypto exchange, the largest in India, said it plans to absorb the costs of the breach. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/21/indian-crypto-exchange-coindcx-confirms-44-million-stolen-during-hack/
-
Indian crypto exchange CoinDCX says $44 million stolen from reserves
The founders of Indian cryptocurrency exchange CoinDCX said no customer funds were affected in a more than $40 million theft from reserves. First seen on therecord.media Jump to article: therecord.media/indian-crypto-dcx-millions-stolen
-
Indian crypto exchange CoinDCX confirms $44 million stolen during hack
The crypto exchange, the largest in India, said it plans to absorb the costs of the breach. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/21/indian-crypto-exchange-coindcx-confirms-44-million-stolen-during-hack/
-
CoinDCX Hack Leads to $44.2 Million Loss
Major Indian cryptocurrency exchange CoinDCX has confirmed a significant security breach that resulted in approximately $44 million in losses, though company executives maintain that customer funds remain completely secure and unaffected by the incident. CoinDCX co-founder Sumit Gupta publicly confirmed reports of the cyberattack, which occurred on Saturday, July 19, 2025. The hackers successfully gained…

