Search Results for: cryptocurrency wallets Blog Post A Google Chrome Extension Steals Crypto-wallet Keys January 8, 2020 Recently, a code was found injected in a Google Chrome extension named “Shitcoin Wallet” for stealing the passwords and private... Blog Post Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the... Knowledge Center Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that... Blog Post Gang Behind the Us Pipeline Hack Closed the Shop, but the Threat Lives May 21, 2021 The DarkSide cybercriminal group behind the recent ransomware cyberattack on Colonial Pipeline shut down its operation. In the name of... Blog Post Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and... Blog Post 9 Individuals Connected to a Hacking Group Charged With Online Identity Theft June 12, 2019 Nine Individuals Connected to a Hacking Group Charged With Online Identity Theft and Other Related Charges Six individuals connected to... Blog Post Malicious Google Web Extensions Can Access to Your Cryptowallet April 20, 2020 Extensions can be installed to add widgets or other functionality to web browsers; they offer the ability to do everything... Blog Post Ryuk Ransomware Removal Guide October 29, 2020 LIFARS Incident Response Team (LISIRT) is observing a heavy increase in Ryuk Ransomware activity, mainly in the healthcare sector. It... Blog Post 15-Year-Old Hacks Ledger Hardware Cryptocurrency Wallet March 21, 2018 A teenage hacker has discovered a flaw in Ledger, a popular hardware wallet that could essentially enable hackers to grab... Blog Post Top 5 Blockchain Security Issues in 2019 December 6, 2019 Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption... Blog Post Hackers Steal $140 Million From Users of Crypto Gaming Company January 28, 2022 Today, it seems like successful multi-million dollar hacks have become an everyday occurrence. What’s more, it feels like it has... Blog Post FBI Recovered Colonial Pipeline’s DarkSide Bitcoins – Cryptocurrency Ransom June 22, 2021 The pleasant news concerning crypto ransomware befell our ears recently from the Department of Justice. At a press conference on... Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve... Blog Post New Cybersecurity Threats for the Crypto Industry August 13, 2021 Blockchain-based cryptocurrencies and financial systems are supposed to be inherently more secure than traditional fiat currencies, thanks to their decentralized... Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Blog Post A Google Chrome Extension Steals Crypto-wallet Keys January 8, 2020 Recently, a code was found injected in a Google Chrome extension named “Shitcoin Wallet” for stealing the passwords and private...
Blog Post Cryptocurrency Scammers Defaced Donald Trump’s Campaign Website November 12, 2020 For less than 30 minutes hackers took over and defaced Donald Trump’s campaign website. The incident took place at the...
Knowledge Center Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that...
Blog Post Gang Behind the Us Pipeline Hack Closed the Shop, but the Threat Lives May 21, 2021 The DarkSide cybercriminal group behind the recent ransomware cyberattack on Colonial Pipeline shut down its operation. In the name of...
Blog Post Cryptocurrency Mixers and Their Use In Ransomware August 15, 2020 Are cryptocurrencies anonymous? Cryptocurrencies should be both transparent and anonymous. Transparency means that everyone can check all the incoming and...
Blog Post 9 Individuals Connected to a Hacking Group Charged With Online Identity Theft June 12, 2019 Nine Individuals Connected to a Hacking Group Charged With Online Identity Theft and Other Related Charges Six individuals connected to...
Blog Post Malicious Google Web Extensions Can Access to Your Cryptowallet April 20, 2020 Extensions can be installed to add widgets or other functionality to web browsers; they offer the ability to do everything...
Blog Post Ryuk Ransomware Removal Guide October 29, 2020 LIFARS Incident Response Team (LISIRT) is observing a heavy increase in Ryuk Ransomware activity, mainly in the healthcare sector. It...
Blog Post 15-Year-Old Hacks Ledger Hardware Cryptocurrency Wallet March 21, 2018 A teenage hacker has discovered a flaw in Ledger, a popular hardware wallet that could essentially enable hackers to grab...
Blog Post Top 5 Blockchain Security Issues in 2019 December 6, 2019 Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption...
Blog Post Hackers Steal $140 Million From Users of Crypto Gaming Company January 28, 2022 Today, it seems like successful multi-million dollar hacks have become an everyday occurrence. What’s more, it feels like it has...
Blog Post FBI Recovered Colonial Pipeline’s DarkSide Bitcoins – Cryptocurrency Ransom June 22, 2021 The pleasant news concerning crypto ransomware befell our ears recently from the Department of Justice. At a press conference on...
Blog Post North Korean Hackers Stole Millions from Cryptocurrency Startups Worldwide February 16, 2022 Startups have it hard enough, but now it looks like cybercriminals are making it even harder to not only achieve...
Blog Post New Cybersecurity Threats for the Crypto Industry August 13, 2021 Blockchain-based cryptocurrencies and financial systems are supposed to be inherently more secure than traditional fiat currencies, thanks to their decentralized...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...