Tag: crypto
-
Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
Katz Stealer has emerged as a potent credential-stealing malware-as-a-service, targeting popular web browsers such as Chrome, Edge, Brave, and Firefox. This multi-feature stealer conducts extensive system reconnaissance and data theft by extracting saved passwords, cookies, and session tokens from these browsers. Beyond browsers, it also compromises cryptocurrency wallets, communication platforms like Discord and Telegram, email…
-
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto
As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint.The packages, published under three different accounts, come with an install”‘time script that’s triggered during npm install, Socket security researcher Kirill Boychenko said in a…
-
Crypto Drainers are Targeting Cryptocurrency Users
Some key recommendations for protecting crypto wallets include: 1. Enable multifactor authentication (2FA or MFA) when available on your wallets 2. Use hardware wallets or cold wallets for maximum security 3. Don’t be phished or socially engineered! Never click a questionable link, install untrusted software, or provide your private keys! 4. Avoid browser extensions! They can…
-
Almost $223M pilfered in Cetus crypto heist
Tags: cryptoFirst seen on scworld.com Jump to article: www.scworld.com/brief/almost-223m-pilfered-in-cetus-crypto-heist
-
Microsoft, DOJ Take Actions Against ‘Favored Info-Stealing Malware’ Lumma
Lumma malware, a MaaS platform active since 2022, has stolen data from 1.7M+ devices, targeting cryptos, logins, and financial information on Windows systems. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-lumma-malware-windows-microsoft-doj/
-
Operation Endgame Takes Down DanaBot Malware, Neutralizes 300 Servers
Operation Endgame takes down DanaBot malware network; 300 servers neutralized, Euro21.2M in crypto seized, 16 charged, 20 international warrants. First seen on hackread.com Jump to article: hackread.com/operation-endgame-danabot-malware-neutralizes-servers/
-
Hacker steals $223 million in Cetus Protocol cryptocurrency heist
The decentralized exchange Cetus Protocol announced that hackers have stolen $223 million in cryptocurrency and is offering a deal to stop all legal action if the funds are returned. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hacker-steals-223-million-in-cetus-protocol-cryptocurrency-heist/
-
Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware
Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application for managing crypto assets via Ledger cold wallets. Since August 2024, Moonlock Lab has been tracking a malware campaign that initially focused on stealing passwords and wallet details but has now evolved to extract seed phrases, enabling attackers to drain…
-
Operation Endgame 2.0: DanaBusted
Tags: access, attack, backup, banking, breach, business, cloud, communications, control, crypto, cybercrime, data, defense, detection, email, espionage, firewall, fraud, government, group, Hardware, infection, intelligence, international, law, malicious, malware, middle-east, network, programming, ransomware, russia, service, supply-chain, switch, threat, tool, ukraine, update, windowsIntroductionOn May 22, 2025, international law enforcement agencies released information about additional actions that were taken in conjunction with Operation Endgame, an ongoing, coordinated effort to dismantle and prosecute cybercriminal organizations, including those behind DanaBot. This action mirrors the original Operation Endgame, launched in May 2024, which disrupted SmokeLoader, IcedID, SystemBC, Pikabot, and Bumblebee. Zscaler…
-
Getarnte Krypto-Miner kapern Docker-Container
Eine neue, raffiniert angelegte Cyberkampagne nutzt Schwachstellen in öffentlich erreichbaren Docker-APIs aus. Ziel ist es, Container-Umgebungen mit Krypto-Mining-Malware zu infizieren und das mit hohem Automatisierungsgrad. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/krypto-miner-docker
-
Bribery-Led Coinbase Hack Affects 70,000 Crypto Customers
Hacker Demanded $20M Ransom to Delete Stolen Personal, Financial Information. A months-long data breach led to the theft of personal and financial information of nearly 70,000 Coinbase customers. Coinbase said the breach dates back to December and was aided by bribery schemes targeting the company’s overseas customer support agents. First seen on govinfosecurity.com Jump to…
-
Decentralized crypto platform Cetus hit with $223 million hack
The company paused the platform for safety reasons before confirming that an attacker had stolen the funds. First seen on therecord.media Jump to article: therecord.media/decentralized-crypto-platform-cetus-theft
-
Operation RapTor: 270 Arrested in Global Crackdown on Dark Web Vendors
Global crackdown: Operation RapTor leads to 270 arrests, millions seized as law enforcement targets dark web drug, weapon, and crypto vendors. First seen on hackread.com Jump to article: hackread.com/operation-raptor-police-arrests-270-dark-web-vendors/
-
Russian Hackers Exploit Oracle Cloud Infrastructure to Target Scaleway Object Storage
Russian threat actors have been leveraging trusted cloud infrastructure platforms like Oracle Cloud Infrastructure (OCI) Object Storage and Scaleway Object Storage to propagate sophisticated attacks using the Lumma Stealer malware. This malware-as-a-service (MaaS) infostealer, also known as LummaC2 Stealer, targets Windows systems to siphon credentials, system data, and cryptocurrency wallets. Investigations conducted in 2025 reveal…
-
Hackers use fake Ledger apps to steal Mac users’ seed phrases
Cybercriminal campaigns are using fake Ledger apps to target macOS users and their digital assets by deploying malware that attempts to steal seed phrases that protect access to digital cryptocurrency wallets. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-use-fake-ledger-apps-to-steal-mac-users-seed-phrases/
-
Coinbase Breach Affected Almost 70,000 Customers
The US cryptocurrency exchange claimed that the breach occurred in December 2024 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/coinbase-breach-affected-almost/
-
DOJ charges 12 more in $263 million crypto fraud takedown where money was hidden in squishmallow stuffed animals
Crypto fraud meets cuddly toys! First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/doj-charges-12-263-million-crypto-fraud-takedown-where-money-hidden-squishmallow-stuffed-animals
-
JavaScript Crypto Library OpenPGP.js Hit by High-Risk Spoofing Vulnerability
A flaw has been discovered in First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cve-2025-47934-openpgp-vulnerability/
-
Cybercrime & Kryptowährungen Teil 2 – So kämpfen Regulierung, Behörden und Forensik gegen Krypto-Kriminalität
First seen on security-insider.de Jump to article: www.security-insider.de/cyberkriminalitaet-krypto-boersen-regulierung-forensik-praevention-a-f8d1a0c6cac246029d6ced9f1a19683f/
-
XRP Futures Offer New Tools for Navigating Crypto Volatility
As the crypto market continues to mature, investors are looking for sophisticated financial instruments that allow them to… First seen on hackread.com Jump to article: hackread.com/xrp-futures-offer-tools-navigating-crypto-volatility/
-
Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication
Tags: api, attack, container, crypto, cyber, cybersecurity, data-breach, docker, exploit, infrastructure, kaspersky, malicious, malwareA novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs to spread malicious containers and mine Dero cryptocurrency. Dubbed a “Docker zombie outbreak” by cybersecurity researchers at Kaspersky, this attack leverages a self-replicating propagation mechanism to transform compromised containers into “zombies” that mine cryptocurrency and infect new victims. The campaign, detected…
-
Microsoft leads international takedown of Lumma Stealer
The Lumma infostealer malware is a popular way for hackers to steal passwords, credit cards and cryptocurrency wallets. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/microsoft-takedown-lumma-stealer/748727/
-
Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
A Google Chrome Web Store campaign uses over 100 malicious browser extensions that mimic legitimate tools, such as VPNs, AI assistants, and crypto utilities, to steal browser cookies and execute remote scripts secretly. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/data-stealing-chrome-extensions-impersonate-fortinet-youtube-vpns/
-
Coinbase data breach impacted 69,461 individuals
Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals. Coinbase disclosed that a data breach impacted 69,461 individuals after overseas support staff improperly accessed customer and corporate data. Coinbase recently revealed that rogue contractors stole data on under 1% of users and demanded $20M; the data breach was initially…
-
Critical flaw in OpenPGP.js raises alarms for encrypted email services
Tags: attack, backdoor, crypto, email, flaw, group, malicious, open-source, risk, service, supply-chain, threat, tool, vulnerabilityTrusting open code: The incident also underscores a familiar trade-off. Open-source libraries such as OpenPGP.js are widely used because they offer transparency, broad adoption, and the advantages of community input and peer review.But trusting open source libraries also means inheriting any flaws they might have, even subtle ones, that can go unnoticed for years.”This vulnerability…
-
Coinbase says recent data breach impacts 69,461 customers
Coinbase, a cryptocurrency exchange with over 100 million customers, revealed that a recent data breach in which cybercriminals stole customer and corporate data affected 69,461 individuals First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/
-
New Go-Based Malware ‘RedisRaider’ Exploits Redis Servers to Mine Cryptocurrency
New RedisRaider malware targets misconfigured Redis servers to deploy stealthy Monero miners, using Go-based code and advanced evasion tactics. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/malware-redis-raider-cryptocurrency/
-
What a Binance CAPTCHA solver tells us about today’s bot threats
In this post, we analyze an open-source CAPTCHA solver designed to bypass a custom challenge deployed on Binance, one of the most popular crypto platforms. While the solver is publicly available, we’ve intentionally chosen not to link to the original repository. The code is minimally documented and was First seen on securityboulevard.com Jump to article:…

