The hackers behind the $625 million Ronin bridge attack in March have since transferred most of their funds from Ether ( ETH ) into Bitcoin ( BTC ) using renBTC and Bitcoin privacy tools Blender and ChipMixer.
The hacker's activity has been tracked by on-chain investigator ₿liteZero, who works for SlowMist and contributed to the company's 2022 Mid-Year Blockchain Security report. They outlined the transaction pathway of the stolen funds since the March 23 attack.
Hackers exploit zero-day bug to steal from General Bytes Bitcoin ATMs
Bitcoin ATM manufacturer General Bytes had its servers compromised via a zero-day attack on Thursday that enabled hackers to make themselves the default administrators and modify settings so that all funds would be transferred to their wallet address.
The amount of funds stolen and the number of ATMs compromised have not been disclosed, but the company has urgently advised ATM operators to update their software.
Crypto hackers stole billions; why it's a growing problem
Hackers have already stolen nearly $2 billion worth of cryptocurrency in 2022 — and the year is only half over.
As of July, $1.9 billion in crypto has been stolen by cybercriminal hacks, according to Chainalysis' "Mid-year Crypto Crime Update."
At this point last year, hackers had stolen $1.2 billion, according to the report. That's a spike of nearly 60% compared to a year ago.
Apple security flaw may allow hackers full control of devices, company warns | Mashable
Major security vulnerabilities found in iOS and macOS devices could allow potential hackers complete control of a user's device, Apple warned on Wednesday. The company quietly published two security reports this past week on the vulnerability citing an anonymous researcher for the discovery.
Some of Those Google Ads Are Actually Hackers
Ads might be annoying, but they're the reason Google doesn't charge you every time you search for something. Occasionally, they're even helpful: If you search for a particular product, and a Google ad serves you up its website as a first result, you're quickly where you need to be.
Styles starting at $10
This sitewide sale will prepare you for any style situation that may arise in the transition between seasons—whether it be a henley and jeans or a button up and chino shorts moment.
Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability
"The attacker was able to create an admin user remotely via CAS administrative interface via a URL call on the page that is used for the default installation on the server and creating the first administration user," the company said in an advisory last week.
It's not immediately clear how many servers were breached using this flaw and how much cryptocurrency was stolen.
Hackers are using this sneaky exploit to bypass Microsoft's multi-factor authentication | ZDNET
Cyber criminals are exploiting dormant Microsoft accounts to bypass multi-factor authentication (MFA) and gain access to cloud services and networks, researchers have warned.
According to Mandiant, cyber criminals are exploiting the self-enrollment process for applying MFA to Microsoft Azure Active Directory and other platforms to take control of Microsoft 365 and other accounts.
We love trees 🥰🍀💕❤️💋😘
#NFT #ETH #nftgiveaways #nftcommunity #Giveaways #NFTPromotion #ART
https://opensea.io/collection/aotam
Hot NFT tree art collection available. This is BIG!
See the amazing artwork. Click here.
No comments:
Post a Comment