article thumbnail

Threat actors hacked the X account of the Securities and Exchange Commission (SEC) and announced fake Bitcoin ETF approval

Security Affairs

“The approved Bitcoin ETFs will be subject to ongoing surveillance and compliance measures to ensure continued investor protection.” Traded on major stock exchanges like stocks and bonds, ETFs enable investors to trade Bitcoin indirectly without direct involvement with the cryptocurrency. ” Gensler wrote.

article thumbnail

SEC X account hacked to hawk crypto-scams

Malwarebytes

We have seen several high-profile accounts that were taken over on X (formerly Twitter) only to be used for cryptocurrency related promotional activities, like expressing the approval of exchange-traded funds (ETFs). A spot Bitcoin ETF will buy the cryptocurrency directly, “on the spot”, at its current price, throughout the day.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolution of Darknets

Schneier on Security

This is interesting : To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized and centralized platforms and instead ventured to use widely accessible technology to build their own communications and operational back-ends.

article thumbnail

Spyware, ransomware and Nation-state hacking: Q&A from a recent interview

Security Affairs

Pegasus is probably the most popular surveillance software on the market, it has been developed by the Israeli NSO Group. Many other surveillance firms develop spyware that are every day abused in dragnet surveillance and target journalists, dissidents, and opponents of totalitarian regimes.

Spyware 89
article thumbnail

Sysrv botnet is out to mine Monero on your Windows and Linux servers

Malwarebytes

The variant they focused on uses a range of known exploits for vulnerabilities in web apps and databases to install cryptocurrency miners on both Windows and Linux systems. Once it has gained a foothold and the bot malware is running on a compromised system it deploys a Monero cryptocurrency miner. The favorite cryptocurrency.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

Although the software is extremely good at what it does, today it services a narrow niche of users who put privacy and security above all, and it has become strongly associated with ransomware, illegal drug markets, and other forms of unsavoury criminal activity. Cryptocurrencies. So why is it on our list at all?

Internet 109
article thumbnail

Security Affairs newsletter Round 418 by Pierluigi Paganini – International edition

Security Affairs

Twitter confirmed that a security incident publicly exposed Circle tweets FBI seized other domains used by the shadow eBook library Z-Library WordPress Advanced Custom Fields plugin XSS exposes +2M sites to attacks Fortinet fixed two severe issues in FortiADC and FortiOS Pro-Russia group NoName took down multiple France sites, including the French (..)