Attacker - Свежие новости [ Фото в новостях ] | |
Understanding the exploit that made EOS.IO “unusable” for two hours
On Sept. 13, an attacker flooded the EOSIO network to drain $110,000 in EOS from a gambling dApp. During the process, many user-facing applications were unusable due to congestion. Here’s how the hacker did it, in detail. дальше »
2019-9-17 13:39 | |
Binance Futures Crash: CZ Blames “Attack”
Changpeng Zhao, CEO of Binance, has blamed a crash in the price of Bitcoin futures on an ‘attacker’. He claims that this was done by a customer who started their own futures exchange a few months ago, but quickly clarified that he had spoken to said client and that it was caused by a mistakeRead MoreRead More. дальше »
2019-9-16 17:26 | |
Dan Larimer On 30k EOS Hack, “No Different Than High Fee Transaction Spam On BTC Or ETH”
An exploitation of EOSIO allowed an attacker to gain 30,000 EOS worth over $110k by winning every roll on the gambling decentralized app (DApp) EOSPlay. The attacker used REX, the Resource Exchange is a bucket that collects all the EOSIO resource fees including RAM sales and name auctions, to have the blocks filled with transactions […] дальше »
2019-9-15 17:52 | |
EOS gambling dApp’s loophole exploited; attacker walks away with 30,000 EOS
The parent blockchain of EOS token, EOSIO became a casualty of an attack, after a gambling dApp was exploited by an attacker, accumulating 30,000 EOS (approximately amounting to 111,000 $) in the process. дальше »
2019-9-14 13:30 | |
Ongoing EOSIO exploit allows attacker to gain 30,000 EOS as network freezes
An ongoing exploit on EOSIO is allowing an attacker to win every roll on gambling dApp EOSPlay by paying to fill blocks with their transactions. So far, the attacker gained 30,000 EOS worth over $110,000 while making the network “unusable. дальше »
2019-9-14 06:38 | |
iPhone spyware campaign reportedly targeted Uyghur Muslims for 2 years
The data-stealing iPhone exploits detailed by Google last week may been used for state-sponsored campaigns targeting the Uyghur Muslim minority in China‘s autonomous region of Xinjiang. “The websites were part of a campaign to target the religious group by infecting an iPhone with malicious code simply by visiting a booby-trapped web page,” TechCrunch revealed, citing sources familiar with the matter. дальше »
2019-9-2 08:45 | |
Critical KNOB exploit penetrates gaping Bluetooth vulnerability
Researchers have discovered a vulnerability in Bluetooth’s authentication protocols which, if properly executed, could allow an attacker to conduct a man-in-the-middle attack between two paired devices. дальше »
2019-8-16 16:19 | |
PSA: Update your Windows machine now to fix 29 Critical security vulnerabilities
Microsoft has patched four serious vulnerabilities that could allow a malicious actor to remotely take control of Windows computers. The four remote code execution flaws — addressed as part of the company’s monthly Patch Tuesday updates — affect all in-support versions of Windows and concern the Windows Remote Desktop Services (RDS) component, enabling attackers to take over a computer and then propagate malware to other computers without any user intervention. дальше »
2019-8-14 14:35 | |
Insidious Bitcoin Scammer Masquerades as John McAfee
An impersonator is attempting to scam followers of outspoken crypto celebrity John McAfee via Medium. The so-called "McAfee Crypto Extravaganza" promises mouth-watering 10x returns - if and only if - you deposit a small amount of Bitcoin or Ethereum in the attacker's wallet first. дальше »
2019-8-13 18:26 | |
Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom
News is emerging that the world’s largest crypto exchange, Binance, has been the victim of an attempted ransom demand from a scammer. The attacker threatened to release KYC information if the company did not cough up 300 Bitcoins. дальше »
2019-8-7 11:44 | |
Vicious malware threatens to turn search engine into crypto-mining zombie botnet
Enterprise search engine Elasticsearch is under threat of being turned into a sophisticated cryptocurrency mining botnet to be used in distributed denial of service (DDoS) attacks. Cybersecurity firm Trend Micro describes a new malware strain that launches multi-stage attacks on publicly accessible databases and servers that run old versions of Elasticsearch software. дальше »
2019-7-23 17:54 | |
This Bluetooth security flaw could let hackers track your Windows, iOS, and macOS devices
Researchers from Boston University (BU) have discovered a flaw in the Bluetooth communication protocol that could expose most devices to third-party tracking and leak identifiable data. According to the research paper — Tracking Anonymized Bluetooth Devices — detailed by Johannes K. дальше »
2019-7-18 10:19 | |
0X Exchange shuts down v2.0 contracts due to potential exploit; deployed patched versions
0x, an open protocol that enabled the peer-to-peer exchange of assets on the Ethereum blockchain, shut down their v2 Exchange due to a flaw in its Exchange contract which was identified by a third-party security researcher Sam Sun. дальше »
2019-7-14 16:00 | |
Apple steps in to automatically remove Zoom’s risky software from Macs
Apple has pushed a silent update to Mac users to remove the web server sneakily installed by popular video conference app Zoom, TechCrunch reports. Earlier this week, a disclosure by security researcher Jonathan Leitschuh revealed how Zoom installed a secret local web server on Mac devices — with an intent to save an extra click — but left users vulnerable by making it possible for an attacker to hijack their webcams. дальше »
2019-7-11 08:41 | |
Researchers find terrifying security vulnerability in GE Healthcare anesthesia machines
Security researchers from Israeli firm CyberMDX have discovered a vulnerability in a select number of GE Healthcare’s anesthesia and respiratory devices. CyberMDX, which focuses primarily on medical cybersecurity, states that if successfully exploited, the hole could allow an attacker to interfere the operation of these sophisticated medical machines, thereby posing a risk to patients. дальше »
2019-7-10 23:30 | |
Scary Monero Flaw Patched to Kill Crypto Exchange Theft Threat
Monero developers have revealed nine security flaws, and one of them can be exploited to steal XMR from cryptocurrency exchanges. Two critical Monero bugs discovered “By mining a specially crafted block, that still passes daemon verification an attacker can create a miner transaction that appears to the wallet to include sum of XMR picked by […] The post Scary Monero Flaw Patched to Kill Crypto Exchange Theft Threat appeared first on CCN Markets дальше »
2019-7-5 13:19 | |
Monero security flaw could’ve seen XMR stolen from cryptocurrency exchanges
Privacy-focused altcoin Monero has suddenly disclosed nine security vulnerabilities — including one that could have allowed hackers to steal XMR from cryptocurrency exchanges. Until March, rogue Monero miners were hypothetically able to create “specifically-crafted” blocks to force Monero wallets into accepting fake deposits for an XMR amount chosen by the attacker. дальше »
2019-7-4 18:18 | |
A hacker penetrated NASA’s network using a $35 Raspberry Pi
A hacker illegally accessed NASA’s Jet Propulsion Laboratory in 2018 by targeting an off-the-shelf micro-computer called a Raspberry Pi. The breach was discovered in 2018, but just disclosed to the public in a June 18 report. дальше »
2019-6-25 02:00 | |
Binance CEO Zhao Slams Firefox as Zero-Day Trojan Targets Coinbase Employees
By CCN Markets: A vulnerability allowing for remote code execution (unauthorized use) in Firefox was exploited against Coinbase employees this past week. The vulnerability enabled an attacker to crash the browser and execute code, including installing a trojan horse backdoor. дальше »
2019-6-24 12:36 | |
Zero Day Vulnerabilities on Mozilla Targeted Coinbase Employees
Security researchers at Google and Coinbase discovered a zero day exploit on the Firefox browser that would allow an attacker to remotely execute code on an underlying operating system, as reported by ZDNet, June 18, 2019. дальше »
2019-6-23 13:00 | |
How to recover your hacked Instagram account
Welcome to TNW Basics, a collection of tips, guides, and advice on how to easily get the most out of your gadgets, apps, and other stuff. Previously, if your Instagram account was taken over by an attacker, recovering it would require wading through choppy customer support, or calling for assistance from white-hat hackers. дальше »
2019-6-18 08:41 | |
Netflix fixes potentially devastating Linux SACK vulnerability
Eagle-eyed researchers from streaming titan Netflix have uncovered several troubling security vulnerabilities within the TCP implementations on Linux and FreeBSD kernels. The most severe specimen, called SACK Panic, could permit an attacker to remotely induce a kernel panic within recent Linux operating systems. дальше »
2019-6-18 22:36 | |
Sidechains vs Plasma vs Sharding
Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions. дальше »
2019-6-14 04:03 | |
Bitcoin’s blockchain rewrite time reaches all-time high
Bitcoin [BTC]’s resurgence on the cryptocurrency charts also caused a change in other factors including mining characteristics and adoption rates. In a recent tweet, Jameson Lopp, the CTO of CasaHODL and creator of satoshi. дальше »
2019-6-8 09:00 | |
Honest Nodes Spoiling a Theft Attempt Is Not a 51% Attack, BCH Devs Detail
A number of Bitcoin Cash detractors and media publications have recently been spreading a false narrative that the BCH network was ‘51% attacked. ’ In reality, however, honest nodes used their hashrate to stave off attacker nodes that were attempting to steal funds on the network. дальше »
2019-5-28 22:30 | |
Cryptopia Fumbles Customers’ Stolen Crypto Recovery in Catastrophic F**kup
By CCN: Cryptopia, the cryptocurrency exchange shattered by an over $16 million hack earlier this year, is in a huge mess as a third-party server host demands $2 million to release customer data. The fall of Cryptopia In January, Cryptopia got hacked two times. дальше »
2019-5-27 14:20 | |
Bitcoin Cash reportedly suffered a 51% attack, transactions reversed
Bitcoin Cash reportedly suffered a 51% attack following its May 15 scheduled hardfork upgrade. Following Bitcoin Cash’s hardfork upgrade, an attacker exploited a vulnerability in the update that added invalid transactions to the pool of unprocessed transactions (the Mempool). дальше »
2019-5-25 01:47 | |
Cryptopia: Stolen Ethereum [ETH] funds continues to move; a portion sent to EtherDelta
The hacker who stole a mammoth amount of cryptocurrency funds from Cryptopia, a New Zealand cryptocurrency exchange, continues to move to stolen funds in the market. Unlike the previous attempts, this time around the attacker transferred the funds to a decentralized exchange, EtherDelta. дальше »
2019-5-22 23:30 | |
Cryptopia hack: Over $7 million worth of Ethereum [ETH] transferred by hacker to unknown wallet
The New Zealand cryptocurrency exchange, Cryptopia, which fell to its doom due to a security breach that occurred earlier this year, continues to stay in the headlines. The attacker, who almost drained the exchange’s entire Ethereum wallets, has been transferring the stolen funds since the beginning of the day. дальше »
2019-5-20 20:32 | |
Bitcoin Cash Vigilante ‘Liquidates’ Upgraded Blockchain Attacker’s Funds
By CCN: An attempted disruption of the Bitcoin Cash blockchain resulted in a negative outcome for the attacker. A BCH tinkerer with Reddit username NilacTheGrim boasted yesterday that he had “liquidated” the crypto funds belonging to the would-be blockchain bandit. дальше »
2019-5-17 15:41 | |
Bitcoin Cash exploit cripples network during scheduled hardfork upgrade
A bug was reportedly exploited on Bitcoin Cash during a scheduled hardfork upgrade of the protocol. For an hour and a half transactions went unprocessed, causing fees to skyrocket. A source familiar with the project says the exploit “looks like a timed attack,” while other rumors are circulating that the “attacker” placed a 180,000 BCH short […] The post Bitcoin Cash exploit cripples network during scheduled hardfork upgrade appeared first on CryptoSlate. дальше »
2019-5-16 21:43 | |
WhatsApp Security Flaw: Specific Users Targeted in Spyware Attack
WhatsApp has confirmed it was subject to spyware that allowed the attacker to read a target’s messages, as reported by MIT Technology Review on May 14, 2019. The hackers accessed messages after penetrating WhatsApp’s encryption through a flaw in the voice call feature. дальше »
2019-5-15 23:00 | |
BitDefender researchers discover terrifying security vulnerability in Intel CPUs
Researchers from Romanian security firm BitDefender have uncovered a troubling security vulnerability in Intel processors that could allow an attacker to access privileged kernel-mode information typically considered “off limits” for most applications. дальше »
2019-5-14 19:59 | |
Vitalik Buterin Eyes Research on Privacy Coin Monero’s Traceability
By CCN: Vitalik Buterin has expressed an interest in incorporating privacy features into Ethereum. He is partial to the ZK-SNARKS technology that is used in privacy coin Zcash. Nonetheless, his senses appear to be particularly keen about any developments surrounding privacy protocols. дальше »
2019-5-11 05:30 | |
Binance Attacker Splits the Stolen BTC to Send to Different Wallets, Community Picks Coinbase As the Safest Exchange
After the recent hack suffered by Binance, a DLT company Coinfirm has been tracing the stolen Bitcoin and says it has been moved to several different wallets дальше »
2019-5-10 11:45 | |
Binance Hack Attacker Moves Stolen Bitcoin To Seven BTC Wallet Addresses
Binance Attacker Moves Stolen Bitcoin To Just Seven Addresses The cryptocurrency exchange Binance was hacked a few days ago and lost 7,074 Bitcoin (BTC) worth $40 million at the time of the attack. The hacker seems to be moving the fund to other addresses in an attempt to withdraw or obfuscate the funds that it […] дальше »
2019-5-9 20:46 | |
Bug on TRON could have allowed a single computer to crash the network
A high severity bug on the TRON network could have allowed an attacker with a single computer to crash the network, as first reported by TNW. The fault stems from a vulnerability related to spamming smart contracts. дальше »
2019-5-7 11:10 | |
TRON suffered from a critical bug that could’ve crashed its entire blockchain
Just one computer could have brought TRON’s entire blockchain to a screeching halt, a new HackerOne disclosure has revealed. Until quite recently, bad actors were reportedly able to maliciously consume the CPU power of the network with Distributed Denial-of-Service (DDoS) attacks. дальше »
2019-5-6 18:49 | |
Zerocoin exploit found, Zcoin attacked, other privacy coins at risk
The Zcoin team discovered a vulnerability in the cryptography of the Zerocoin protocol that allows an attacker to forge zero-knowledge proofs and create coins out of thin air. Coins using the protocol such as Veil are vulnerable to attack until Zerocoin is disabled. дальше »
2019-4-29 22:01 | |
Five most prolific 51% attacks in crypto: Verge, Ethereum Classic, Bitcoin Gold, Feathercoin, Vertcoin
51% attacks are a cryptocurrency’s worst nightmare. These attacks destroy confidence in a project and emphasize the need for carefully designed proof-of-work consensus. Below is a list of the five most prolific 51% attacks in crypto. дальше »
2019-4-24 12:50 | |
Electrum Servers Remain Under Sustained DoS Attack
Electrum servers are still under a sustained Denial-of-Service (DoS) attack. The wallet developers announced the issue on April 7, 2018. In correspondence with Bitcoin Magazine, Electrum developer Thomas Voegtlin speculated that the attack may be a form of retaliation from a phishing attacker who has been targeting Electrum in recent weeks. дальше »
2019-4-11 21:47 | |
Research Firm Says Stellar Under-Publicized a $2.2 Billion Bug In 2017
Stellar has come under fire for its treatment of an inflation bug that occurred almost two years ago. This week, Messari Research issued a report indicating that in 2017, Stellar “quietly patched” a major vulnerability that allowed an attacker to freely create millions of dollars worth of Stellar Lumens (XLM). дальше »
2019-3-30 18:52 | |
Crypto Bombshell: Stellar Swept Mammoth Inflation Bug Under the Rug
By CCN. com: A bug in the code for Stellar – the eighth-largest cryptocurrency – allowed an attacker to generate 2. 25 billion lumens in April 2017 successfully. Stellar quietly patched the bug in version in 0. дальше »
2019-3-29 22:40 | |