This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
cryptocurrency exchange Coinbase recently disclosed that it had fallen victim to a sophisticated social The post SocialEngineering Attack: Coinbase Customer Data Stolen, 70K Users Affected appeared first on Daily CyberSecurity. The publicly listed U.S.
The malware’s infection chains and system persistence methods echo those used in DPRK’s cryptocurrency-stealing operations—albeit now adapted and deployed globally by Russia-affiliated threat actors. That’s when the malware begins to harvest sensitive data—and lay the groundwork for persistent access.
AI-Enhanced Pentesting Tools: Threat actors are using AI to boost the capabilities of penetrationtesting (pentesting) tools, allowing them to identify flaws in victim systems faster. Affiliates using IABs for access need to have non-traceable cryptocurrency and often a guarantor to facilitate purchase.
CoinMarketCap suffered a client-side attack on June 20, 2025, using a fake "doodle" graphic to deliver Inferno Drainer, stealing over $43,000 from user wallets.
North Korean APT BlueNoroff (TA444) exploited deepfakes in Zoom calls to trick a crypto foundation employee into installing custom macOS malware for digital asset theft.
North Korean APTs are using "NimDoor," a new Nim-based macOS malware, to target Web3/crypto startups via fake Zoom meetings, stealing browser, Keychain, and Telegram data with novel persistence.
Threat analysts at Silent Push have uncovered a new campaign orchestrated by the North Korean state-sponsored APT group, The post North Korean APT ‘Contagious Interview’ Launches Fake Crypto Companies to Spread Malware Trio appeared first on Daily CyberSecurity.
Microsoft has issued a warning about the North Korean hacking group Sapphire Sleet (BlueNoroff), which is deploying a new infrastructure for impending socialengineering campaigns on LinkedIn.
Group-IB and Swiss insurance broker ASPIS that owns CryptoIns project, have developed the world’s first scoring model for assessing cryptocurrency exchanges. Based on the risk score, CryptoIns experts have calculated insurance rates for cryptocurrency exchange users who can now insure their accounts against cyber threats.
The FBI has warned sternly about North Korean state-sponsored hackers employing highly sophisticated socialengineering tactics to infiltrate decentralized finance (DeFi) and cryptocurrency companies.
The Tapioca Foundation, a cryptocurrency project, has fallen victim to a sophisticated socialengineering attack, resulting in the theft of $4.7 The attack, which occurred on October 18, 2024,... The post Tapioca Foundation Offers $1M Bounty After $4.7M DeFi Heist appeared first on Cybersecurity News.
Cryptocurrency targeted attacks. The cryptocurrency business continues to grow, and people continue to invest their money in this market because it’s a digital asset and all transactions occur online. More cryptocurrency-related threats: fake hardware wallets, smart contract attacks, DeFi hacks, and more.
AI could impact more than just socialengineering. “It’s reasonable to assume that highly automated reconnaissance target selection, penetrationtesting and delivery of pre-packaged victims to cyber criminals will absolutely be the norm,” said Ferguson.
Through a cryptocurrency like Bitcoin or LiteCoin, or 2.) Socialengineering: Socialengineeringtesting is an effective tool to complement user awareness by exposing human flaws in processes that can subsequently be addressed. Payment of a ransom is typically done in one of two ways: Either 1.)
Ransomware, a definition Ransomware is a set of malware technologies, hacking techniques, and socialengineering tactics that cybercriminals use to cause harm, breach data, and render data unusable. Victims pay ransomware adversaries for decryption keys through cryptocurrency, such as Bitcoin. Unpatched exploits.
Taiwan's BitoPro exchange confirms North Korea's Lazarus Group stole $11.5M in crypto via phishing an employee and bypassing MFA on AWS infrastructure.
Based on our telemetry, we pinpointed two victims within the South Korean cryptocurrency sector. We additionally observed the threat actor behind this backdoor launching penetrationtesting tools, such as Ligolo-ng, Inveigh and Impacket. The first compromise occurred in August 2023, followed by a second in November 2023.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content