In a new document leaked from Bitstamp, one of the more popular Bitcoin exchanges in the world, the company details how a phishing attack several months ago bereft the company of roughly $5 million at then-current prices.
Beginning around page nine of the leaked report, which is clearly marked confidential but is already floating around numerous mirror sites since its initial leak, the document details how the company discovered an "ominous" and large data movement of around 3.5 gigabytes from Bitstamp's server to an IP in Germany. The company determined that it was their wallet.dat file that had gone over the tubes from their servers to some unknown.
Read moreA lot of Twitter users looking for a way to get their accounts verified have been duped by a single fake account promising to provide the service into visiting a phishing page.
How many of them actually went through the steps required is unknown, but according to Malwarebytes' Chris Boyd, this wasn't the only account of this kind to be suspended recently, and there are sure to be others popping up. The account in question successfully impersonated Twitter's official "Verified Account" account. The phishers used the same name and icon but, of course, couldn't get the blue badge with a check mark next to the username.
Read moreUnwanted email has long stopped being just a source of advertising services or products. The time it takes to erase all spam messages from your inbox is not the only drawback of this threat. It’s not a secret that cybercriminals use spam as a channel to spread malware: malicious objects are, as a rule, attached to the message.
Spam might also contain a link to malicious web resources serving the ground of a phishing attack or are injected with a malicious code. That means, once in the inbox, such emails would become an open door for a banking Trojan and, as a result, become a means of stealing money from online banking systems.
Read moreSome of the most effective scams are often very simple; take for example dressing up as a police officer and asking someone to hand over the keys to their car. The average person on the street would probably hand them over without question and this is why impersonating a police officer is classed as a very serious crime the world over.
This scam has two things going for it: its simplicity and the fact that people have an overwhelming tendency to trust figures of authority. These two qualities work just as well in the world of cybercrime and we recently came across a case that proves just that.
Read moreA new study has warned how employees could be exposing their companies to cyber attacks through their social media accounts. IT professionals in the poll believe that social media is an easy way for hackers to gain access to corporate networks because it is an area often neglected in terms of network security.
Social media can be an attack entry point, simply handing out directions on policy may not be enough. Worryingly, when consumer respondents were asked if they, or anyone they know, has had their Facebook identity stolen or attempted to be stolen a quarter of respondents said yes.
Read moreResearcher says a whopping 2.8 million users have downloaded malicious Minecraft Android applications. There were found 30 malicious apps uploaded to the Google Play store over nine months masquerading as Minecraft cheats and tip guides.
The apps craft an SMS which sports text masquerading as an anti-virus activation request. Replying to the message results in the victim signing up to the weekly premium SMS subscription. Flash ads littered the applications pointing users to fake anti-virus warnings and other scareware sources.
Read moreAccording to CEO and co-founder of WhatsApp messenger Kum Yang, the number of monthly active users messaging application mark of 800 million people in April 2015.
Present owner says the number of WhatsApp users will exceed 1 billion. In the last few days WhatsApp users actively send each other messages that the service will soon be paid. To use free messenger and become a frequent user, it is necessary to send a warning to ten people from your contact list. “Jim Balsamic, CEO WhatsApp” is mentioned as the author of the message. Security experts recommended to ignore spam.
Read moreThe Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial disputes between various Southeast Asian nations.
Naikon infects its victims with spear-phishing emails in which malicious executables masquerade as seemingly relevant document attachments. When a victim opens one of these malicious attachments, a decoy document appears as an executable file and quietly exploits an old Microsoft Office vulnerability, installing malware on the victim’s machine.
Read moreCredit card hackers looking for new ways to drain money from consumers' bank accounts and evade increased bank security measures have discovered a clever side door — the Starbucks mobile payment app and gift cards.
Criminals are hijacking consumers' coffee accounts, draining the stored value of their cards, and then using Starbucks' auto-reload function to hack consumers' associated debit and credit cards. Fraud is moving away from banks into big e-commerce companies. Criminals are learning how to turn rewards programs, points and prepaid cards into cash.
Read moreThe Automated Teller Machine has always been a popular target for criminals looking to quickly steal cash. More than likely, you have heard of criminals robbing people who have just made a cash withdrawal, but there are a range of other things criminals can do to manipulate the ATM itself.
These attacks can range from subtle card skimming mechanisms to more brazen approaches such as removing the entire ATM using industrial equipment like a fork lift truck, exploding the ATM after filling it with gas, or even tunneling underground to penetrate the ATM from below.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland