article thumbnail

Identifying the Person Behind Bitcoin Fog

Schneier on Security

Identifying the person behind Bitcoin Fog serves as an illustrative example of how hard it is to be anonymous online in the face of a competent police investigation: Most remarkable, however, is the IRS’s account of tracking down Sterlingov using the very same sort of blockchain analysis that his own service was meant to defeat.

article thumbnail

Russians charged with hacking Mt. Gox exchange and operating BTC-e

Security Affairs

Two Russian nationals have been charged with the hack of the cryptocurrency exchange Mt. Gox in 2011 and money laundering. Russian nationals Alexey Bilyuchenko (43) and Aleksandr Verner (29) have been charged with the hack of the cryptocurrency exchange Mt. Then the attackers transferred funds from Mt. ” reads the DoJ.

Hacking 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

John McAfee found dead in prison cell ahead of extradition to US

Security Affairs

The company was purchased by Intel in 2011 for more than $7.6bn. According to the indictment , the expert earned millions in income from promoting cryptocurrencies, consulting work, speaking engagements, and selling the rights to his life story for a documentary.

article thumbnail

Crypto security breaches cause $4.25 billion losses worth of cryptos in 2021

Security Affairs

The cyberattacks against the cryptocurrency industry are a profitable business for threat actors, according to the experts, $12.1 billion worth of cryptocurrencies have been stolen in the last decade. “Cryptocurrency crime stands in direct proportion to the size of the cryptocurrency market. Threat actors stole $3.18

article thumbnail

The Origins and History of the Dark Web

Identity IQ

Transactions on the dark web are typically conducted using cryptocurrencies such as Bitcoin to maintain anonymity. You probably use the deep web all the time — examples may include bank accounts, your email, and login-restricted content such as news or streaming entertainment. From 2011 to 2013, the Silk Road hosted 1.2

article thumbnail

Google obtained a temporary court order against CryptBot distributors

Security Affairs

The malware allows operators to steal login credentials from popular services such as social media platforms and cryptocurrency wallets, then stolen data is sold on cybercrime forums by the operators. CryptBot malware is active since at least 2019, it allows operators to steal sensitive data from the Google Chrome of the infected systems.

Malware 91
article thumbnail

Google disrupts the Glupteba botnet

Security Affairs

The blockchain-enabled botnet has been active since at least 2011, researchers estimate that the Glupteba botnet is currently composed of more than 1 million Windows PCs around the world. The IT giant also removed 1,183 Google accounts, 908 cloud projects, and 870 Google Ads accounts used by the operators. Pierluigi Paganini.

Backups 109