Cryptocurrency hack

In this section, we talk about the newest news about cryptocurrency hacks, such as breaches, steals, and security holes that affect digital assets. We give in-depth stories on how these hacks happened, how they affected people, and what is being done to make the cryptocurrency space safer. Keep up with how hackers are changing their methods and the best ways to keep your digital currencies safe.

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices. …

2 weeks ago

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their…

3 weeks ago

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially in products like Confluence, which put…

3 months ago

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger malicious script execution, which establishes persistence,…

3 months ago

Hackers Abused StackExchange Platform To Deliuver Malicious Python Package

Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a StackExchange post to distribute the malware. …

4 months ago

Beware Of Malicious Crypto Management App That Drains Your Wallet

A forwarded Telegram video advertises heavily discounted, high-profile cryptocurrency projects, enticing viewers with links to a seemingly legitimate second-tier exchange…

4 months ago

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in 2020, to the extent that eBooks…

4 months ago

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine hosts by using new binaries chkstart…

5 months ago

8220 Gang Exploiting Oracle WebLogic Server Flaw To Deploy Cryptominer

The Oracle WebLogic Server vulnerabilities enable hackers to access unauthorized systems that are used for business data and applications.  This…

6 months ago

Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities

The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises…

6 months ago