Search
navigator.clipboard API
11.1.2021
Interacting with a user’s host clipboard is something web developers have wanted for both good and evil purposes. On the good side, it’s nice to allow users to easily copy text like wallet addresses or branch names; for evil, copying malicious text that the user may mistakenly paste...
Hackers Are Using Three Fake Crypto-Related Apps to Drain Wallets
7.1.2021
While bitcoin (BTC) prices are increasing, crypto-related scams appear on the scene to take advantage of the situation. In this case, a security firm spotted three malicious crypto apps targeting users to steal their funds. Three Bogus Crypto Trading and Poker Apps Are Infected With Dangerous...
CyberGhost VPN Will Shield Your Bitcoin Transactions With a Special 83% off New Year’s Offer
31.12.2020
The crypto world is full of malicious hackers and other serious threats to your digital assets. CyberGhost VPN, which is trusted by over 36 million users globally, can help protect your security when making online transactions and payments. The service accepts bitcoin and you can now save over...
Two Rubygems Infected With Crypto-Stealing Feature Malware Spotted by Researchers
19.12.2020
New infected Rubygems packages have been spotted in its open-source software repository and which contained malicious code mainly used to steal cryptocurrencies from users via supply chain attack. Two Cryptocurrency-Stealers Rubygems Detected by Researchers at Sonatype According to Ax Sharma,...
Fraudulent Crypto Browser Extension Redirects to a Fake Metamask Domain
6.12.2020
A crypto intelligence firm has raised red flags about an increasing flow of comments in the crypto community about an ongoing phishing campaign, which is stealing funds from people who install a malicious browser extension. Chrome Browser Extension Is Redirecting Crypto Users to a Fake Metamask...
New Paper: Ripple Network Doesn’t Meet Criteria To Reach Consensus
3.12.2020
A brand-new paper which analyzes the Ripple network concluded that the network does not reach true consensus, as its protocol “may violate safety and liveness,” and doesn’t follow the established models and algorithms for a Byzantine agreement. Report Claims XRP’s Network...
$100 Million Liquidated on Defi Protocol Compound Following Oracle Exploit
27.11.2020
Lenders on decentralized finance (defi) protocol Compound on Thursday got liquidated for a massive $103 million, according to analytics provider Loanscan. This happened after what appears to be an oracle exploit on the Dai stablecoin. An apparent error or malicious attack to the Dai-dollar-peg data...
Tron Blockchain Stalled for Hours by ‘Malicious Contract,’ Justin Sun Says
2.11.2020
A “malicious contract” caused a Tron blockchain super representative to suspend block production for a few hours on Monday
IPFS lead explains how malicious files are eliminated from its network
24.10.2020
Decentralized ecosystems still need a way to deal with nefarious files
Research: New Malware Employs Tor and Bittorrent To Steal Bitcoin and Ether
4.9.2020
A new trojan called Krypto Cibule uses infested computers’ power to mine cryptocurrency, steal crypto wallet files, and redirect incoming digital assets to a hacker address. The malware rides on the Tor network and the Bittorrent protocol to perform attacks, according to an extensive report...
Tesla Foils Ransomware Attack After Employee Rejects Bitcoin Bribe Worth $1 Million
1.9.2020
Tesla’s Elon Musk has said the company recently foiled attempts to infect its computer network with malicious software, after an employee cooperated with the FBI in an investigation. The malicious software would create an opportunity for criminals to extort money from Tesla. Musk’s...
Someone Just Lost $16M in Bitcoin By Using a Malicious Install of the Electrum Wallet
31.8.2020
An Electrum wallet user claims to have lost a fortune in bitcoin after installing an older version of the software from a malicious source
Bitcoin Users Leery of Tor: 23% of the Network’s Exit Capacity Compromised
13.8.2020
Hackers are stealing bitcoin through the large-scale use of malicious relays on the Tor network according to a newly published research report on the subject. The researcher dubbed “nusenu” said he warned people about the growing problem in December 2019 but instead of improving...
The Five Most Malicious Ransomwares Demanding Crypto to Watch Out For
4.7.2020
As tech advances, so too, do the malware attacks. Amid a pandemic, ransomwares are turning to privacy-centric coins to get away with crime
Jetpack Scan
2.6.2020
Fresh from the Jetpack team at Automattic, today, comes Jetpack Scan. Jetpack Scan scans all the files on your site looking for anything suspicious or malicious and lets you know, or literally fixes it for you with your one-click approval.
This kind of security scanning is very important to...
Google Pulls 49 Cryptocurrency Wallet Browser Extensions Found Stealing Private Keys
15.4.2020
Google has removed 49 cryptocurrency wallet browser extensions after a security researcher discovered they were stealing private keys. These Chrome extensions targeted users of crypto wallets, such as Ledger, Trezor, Jaxx, Electrum, Myetherwallet, Metamask, Exodus, and Keepkey. Also read: Bitcoin...
Ledger Wallet User Allegedly Lost $16K to Malicious Browser Extension
2.1.2020
Ledger hardware wallet confirms phishing alert for “Ledger Secure” Chrome browser extension
Chrome Browser Extension Ethereum Wallet Injects Malicious JavaScript To Steal Data
31.12.2019
Chrome extension ‘Shitcoin Wallet’ is injecting malicious javascript to steal user data
Malicious Groups Collated Leaked Crypto Trader Data - BitMEX
4.11.2019
After major cryptocurrency exchange BitMEX accidentally leaked users' emails last week, they've noticed unidentified groups who tried collecting users' email addresses with the intent to compromise them.
"As it became clear that several groups were working to collate BitMEX email addresses...
Zcash Community Discovers Likely Malicious Fake Version of ZecWallet
21.10.2019
Zcash users discover a counterfeit version of ZecWallet