The largest dark web marketplace for stolen credit and debit cards, UniCC has stated that it’s shutting down its operations. Since 2013, UniCC has…
cryptocurrency
Crypto Mining attacks use evolved version
A crypto mining campaign, which has been active, has developed its method to avoid detection. The threat actors have evolved their attack method to…
Babadeda crypter used for camouflaging Malware
An unknown malware attack has been identified targeting cryptocurrency, non-fungible token (NFT), and Defi aficionados. The attack uses discord channels to plant a crypter…
Cryptocurrency ATMs and QR codes used for fraud, reports the FBI
Cyberfraud victims are increasingly being asked to pay through Quick Response (QR) code and cryptocurrency ATMs. This makes recovery of payment impossible. The FBI…
QR codes used for stealing Microsoft credentials and crypto funds
Researchers discovered an email-based phishing scam: emails containing QR codes for pilfering users’ Microsoft details and other data. Between September 15 and October 13,…
Stock market affected by the Ransomware
Ransomware attacks can be extremely costly for businesses, and their frequency is on the rise. The ransom amount might range from thousands to millions…
Cryptocurrency Theft: $3 Million stolen from SushiSwap MISO
An attacker used a supply-chain assault to steal $3 million in cryptocurrency theft from the SushiSwap MISO cryptocurrency platform by infecting Sushi’s private GitHub…
Poly Network asserts hacker returned $600 Million stolen
An epic, just as unusual crypto heist story, appears to have arrived at its end. Poly Network, Decentralized Finance(DeFi) stage, declared the attackers that…
Raccoon stealer-as-service : the new target is cryptocurrency
Raccoon Stealer has been overhauled or what they say updated by its designer to rob cryptocurrency close by monetary data. On Tuesday, Sophos delivered…
Cryptocurrency Users Watch Out! Cybercriminals are Hitting Hard
Illegal crypto-mining campaigns are developing further as cybercriminals keep on advancing their assault strategies and malware. One of the fundamental purposes behind the ascent…