Blog

Archive for the ‘cryptocurrencies’ category

Dec 7, 2024

This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges

Posted by in categories: cryptocurrencies, cybercrime/malcode, robotics/AI

Android malware DroidBot targets 77 institutions with dual C2 channels, MaaS model, and advanced spyware tactics.

Nov 25, 2024

Texas seeks to regulate cryptocurrency mining on ERCOT grid

Posted by in categories: computing, cryptocurrencies

The Public Utilities Commission of Texas (PUCT) on Thursday adopted a rule requiring virtual currency mining facilities in the region maintained by the Energy Reliability Council of Texas (ERCOT) to register with the commission. In these registrations, the PUCT seeks each facility to share its location, ownership information and demand for electricity.

Cryptocurrency mining, in which computers crack codes in order to verify crypto transactions, has been on the rise in Texas for the past few years, specifically after China banned the practice in May 2021. The state itself was luring miners to set up shop here, offering relative regulatory freedom at first. But in the last year, Texans have been speaking out against the mines, which operate scores of their large computers at all hours of the day. The computer usage, coupled with the fans required to cool down the hard-working machines, can use up a lot of power and make the kind of noise that residents say make them sick.

Nov 25, 2024

Scammers exploit tiny typos to trick people into sending money to their crypto wallets

Posted by in categories: blockchains, cryptocurrencies, cybercrime/malcode, economics

A team of cybersecurity researchers at Stony Brook University has uncovered a new way for scammers to steal from unsuspecting cryptocurrency users. They have posted a paper to the arXiv preprint server describing the new crypto scam and how users can protect themselves.

Cryptocurrency is a type of digital currency run on a secure online platform. One example is Coinbase. Crypto currency is stored in a crypto wallet. In this new study, the team in New York reports that scammers have found a way to get people to redirect crypto payments away from intended recipients and toward wallets held by the scammers.

The researchers call the scam typosquatting. It involves setting up Blockchain Naming Systems (BNS) that are similar to those used by well-known entities. It exploits the use of simple word-based addresses rather than the complicated and hard-to-remember letter and digit codes commonly associated with crypto wallets.

Nov 18, 2024

Trump’s AI Plans Could Change Everything: Inside The Next AI Revolution

Posted by in categories: augmented reality, blockchains, cryptocurrencies, government, policy, robotics/AI

🚀 Q: How might Trump’s administration impact AI development in the US? A: Trump aims to make America “first in AI” by dismantling Biden’s policy framework and reducing government regulation, potentially leading to skyrocketing growth in AI, cryptocurrencies, blockchain, Web3, and augmented reality.

🔓 Q: What’s J.D. Vance’s stance on AI development? A: Trump’s potential VP J.D. Vance supports open source AI and decentralized power, aiming to prevent large tech companies from steering regulation and allowing smaller innovators to compete.

Nov 11, 2024

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

Posted by in categories: bitcoin, cryptocurrencies, economics

Bitcoin Fog founder sentenced to 12 years for laundering $400M in criminal proceeds using his darknet mixer.

Nov 9, 2024

Dude, Where’s My Quantum Computer? Is the Field Stuck in Limbo?

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption, internet, quantum physics

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3QFIrFX
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about recent discoveries about quantum computers.
Links:
https://journals.aps.org/prapplied/abstract/10.1103/PhysRevApplied.22.034003
http://cjc.ict.ac.cn/online/onlinepaper/wc-202458160402.pdf.
https://arxiv.org/pdf/2307.03236
https://www.science.org/doi/10.1126/sciadv.adn8907
https://qiskit.github.io/qiskit-aer/stubs/qiskit_aer.QasmSimulator.html.
https://arxiv.org/abs/2302.00936
Previous videos:
https://youtu.be/Jl7RLrA69pg.

https://youtu.be/dPqNZ4aya8s.
#quantum #quantumcomputing #quantumcomputer.

Continue reading “Dude, Where’s My Quantum Computer? Is the Field Stuck in Limbo?” »

Oct 14, 2024

FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

Posted by in category: cryptocurrencies

U.S. DoJ charges 18 in a $25M cryptocurrency fraud operation, uncovering market manipulation through an FBI-led sting.

Oct 11, 2024

The FBI secretly created a coin to investigate crypto pump-and-dump schemes

Posted by in categories: cryptocurrencies, finance

“What the FBI uncovered in this case is essentially a new twist to old-school financial crime,” Jodi Cohen, the special agent in charge of the FBI’s Boston division, said in a statement. “What we uncovered has resulted in charges against the leadership of four cryptocurrency companies, and four crypto ‘market makers’ and their employees who are accused of spearheading a sophisticated trading scheme that allegedly bilked honest investors out of millions of dollars.”

Liu Zhou, a “market maker” working with MyTrade MM, allegedly told promoters of NexFundAI that MyTrade MM was better than its competitors because they “control the pump and dump” allowing them to “do inside trading easily.”

An FBI spokesperson told CoinDesk that there was limited trading activity on the coin but didn’t share additional information. On a Wednesday press call, Joshua Levy, the acting US attorney for the District of Massachusetts, said trading on the token was disabled, according to CoinDesk.

Oct 5, 2024

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Posted by in categories: cryptocurrencies, cybercrime/malcode, internet

“When a new user logs into the server, it immediately stops all ‘noisy’ activities, lying dormant until the server is idle again. After execution, it deletes its binary and continues to run quietly in the background as a service.”

It’s worth noting that some aspects of the campaign were disclosed last month by Cado Security, which detailed an activity cluster that targets internet-exposed Selenium Grid instances with both cryptocurrency mining and proxyjacking software.

Specifically, the fileless perfctl malware has been found to exploit a security flaw in Polkit (CVE-2021–4043, aka PwnKit) to escalate privileges to root and drop a miner called perfcc.

Sep 23, 2024

Global infostealer malware operation targets crypto users, gamers

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named “Marko Polo.”

The threat actors use a variety of distribution channels, including malvertising, spearphishing, and brand impersonation in online gaming, cryptocurrency, and software, to spread 50 malware payloads, including AMOS, Stealc, and Rhadamanthys.

According to Recorded Future’s Insikt Group, which has been tracking the Marko Polo operation, the malware campaign has impacted thousands, with potential financial losses in the millions.

Page 1 of 6612345678Last