article thumbnail

North Korean Hackers Steal $1.5B in Cryptocurrency

Schneier on Security

From there, the cryptocurrency was transferred out of Bybit altogether and into wallets controlled by the unknown attackers. […] …a subsequent investigation by Safe found no signs of unauthorized access to its infrastructure, no compromises of other Safe wallets, and no obvious vulnerabilities in the Safe codebase. .”

article thumbnail

FBI: Spike in Hacked Police Emails, Fake Subpoenas

Krebs on Security

The Federal Bureau of Investigation (FBI) is urging police departments and governments worldwide to beef up security around their email systems, citing a recent increase in cybercriminal services that use hacked police email accounts to send unauthorized subpoenas and customer data requests to U.S.-based based technology companies.

Hacking 303
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Disrupting the operations of cryptocurrency mining botnets

Security Affairs

Cybersecurity researchers devised two attack techniques to disrupt the operations of cryptocurrency mining botnets. Akamai Researchers uncovered two novel techniques to disrupt cryptocurrency mining botnets by exploiting flaws in common mining topologies. Though not permanent, this disruption can significantly hinder the attack.

article thumbnail

Using Hacked LastPass Keys to Steal Cryptocurrency

Schneier on Security

That’s a really profitable hack. (It’s Remember last November, when hackers broke into the network for LastPass—a password database—and stole password vaults with both encrypted and plaintext data for over 25 million users? It’s also bad opsec. The hackers need to move and launder all that money quickly.)

article thumbnail

Perfectl Malware

Schneier on Security

The researchers are calling the malware Perfctl, the name of a malicious component that surreptitiously mines cryptocurrency. Besides using the machine resources to mine cryptocurrency, Perfctl also turns the machine into a profit-making proxy that paying customers use to relay their Internet traffic.

Malware 263
article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. According to prosecutors, the group mainly sought to steal cryptocurrency from victim companies and their employees.

article thumbnail

Lazarus APT stole $1.5B from Bybit, it is the largest cryptocurrency heist ever

Security Affairs

worth of cryptocurrency from one of the companys offline wallets. The Bybit hack is the largest cryptocurrency heist ever, surpassing previous ones like Ronin Network ($625M), Poly Network ($611M), and BNB Bridge ($566M). “*Update* It’s now been confirmed that North Korea’s Lazarus Group were behind this hack.”