<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cryptocurrency Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/cryptocurrency/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 10 Aug 2022 01:44:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How cryware works and how to avoid it.</title>
		<link>https://www.osradar.com/how-cryware-works-and-how-to-avoid-it/</link>
					<comments>https://www.osradar.com/how-cryware-works-and-how-to-avoid-it/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Wed, 10 Aug 2022 01:44:58 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryware]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=36684</guid>

					<description><![CDATA[<p>Hello! When surfing the Internet, we can encounter all kinds of security threats. Some of them can steal passwords and personal data. On the other hand, others affect the operation of the network, sometimes encrypt files and ask for money in return. In fact, all of this can impact both home users and businesses and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-cryware-works-and-how-to-avoid-it/">How cryware works and how to avoid it.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! When surfing the Internet, we can encounter all kinds of security <a href="https://www.osradar.com/how-an-exploit-works-and-how-to-protect-ourselves-from-it/" target="_blank" rel="noreferrer noopener">threats.</a> Some of them can steal passwords and personal data. On the other hand, others affect the operation of the network, sometimes encrypt files and ask for money in return. In fact, all of this can impact both home users and businesses and organizations. In this post we are going to talk about what Cryware is all about. Specifically, how it impacts us and how to avoid it.</p>



<h2>What is cryware?</h2>



<p>Cryware is directly related to cryptocurrencies. Indeed, digital currencies are widely used today as an investment method. However, they are also used to make online purchases. But the truth is that they are targeted by hackers to launch a wide variety of attacks and steal them.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="1020" height="402" src="https://www.osradar.com/wp-content/uploads/2022/07/cry.png" alt="" class="wp-image-36685" srcset="https://www.osradar.com/wp-content/uploads/2022/07/cry.png 1020w, https://www.osradar.com/wp-content/uploads/2022/07/cry-300x118.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/cry-768x303.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/cry-696x274.png 696w" sizes="(max-width: 1020px) 100vw, 1020px" /></figure>



<p>We can say that a Cryware is an information thief related to cryptocurrencies. In fact, they are responsible for collecting user data, such as credentials and passwords. Consequently, they seek to break into accounts or intercept a payment we make. Usually, these attacks result in the theft of all types of cryptocurrencies or fraudulent transfers.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="993" src="https://www.osradar.com/wp-content/uploads/2022/07/cry2-1024x993.png" alt="" class="wp-image-36686" srcset="https://www.osradar.com/wp-content/uploads/2022/07/cry2-1024x993.png 1024w, https://www.osradar.com/wp-content/uploads/2022/07/cry2-300x291.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/cry2-768x745.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/cry2-696x675.png 696w, https://www.osradar.com/wp-content/uploads/2022/07/cry2-1068x1036.png 1068w, https://www.osradar.com/wp-content/uploads/2022/07/cry2.png 1400w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2>How it works</h2>



<p>These types of attacks have grown considerably recently. Especially at the same pace as the use of cryptocurrencies. Hackers know that they have a great opportunity because there are many careless users who buy and sell cryptocurrencies on the Internet. In addition, they often fail to take appropriate measures.</p>



<p>This type of attack has grown considerably recently. We could say that at the same rate as the use of cryptocurrencies. Hackers know that they have a great opportunity, as there are many careless users who buy and sell cryptocurrencies on the Internet. And that, in addition, in many occasions they do not take the appropriate measures. This is an irreversible attack. That is, once the cryptocurrencies have been stolen, there is no way to reverse the situation. Those digital currencies are lost to us, as they are automatic transactions. In effect, there is no way of knowing where it is going or who is going to receive them.</p>



<p>But Cryware is not just about stealing cryptocurrencies. In fact, they can also use your system resources to mine digital currencies without you even realizing it. This is what is also known as cryptocurrency miners. They will use the power of a computer, for example, to mine cryptocurrencies in a hidden way.</p>



<h2>How they can attack you</h2>



<p>You may wonder how they can attack you with this type of threat. In fact, they can use different methods to do so. Basically, they will act as with other similar security threats that you can find on the web. The goal will be to control your cryptocurrencies, or even go as far as to mine them.</p>



<p>A very common technique is to use keyloggers. That is, a type of malware that is responsible for collecting the keystrokes that we put on the computer or cell phone. This also includes passwords. Consequently, they will find out what is the key to access an account where we store cryptocurrencies. Or even to a program from which we send or receive cryptocurrencies such as Bitcoins, Ethereums or whatever.</p>



<p>They can also use the impersonation technique. That is, they will create a web page identical to the legitimate one. However, in reality it is a scam. This is a phishing attack, like many others on the Web. All you have to do is log on to these sites and enter your data. As a result, they will end up on a server controlled by hackers.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="1002" src="https://www.osradar.com/wp-content/uploads/2022/07/cry3-1024x1002.png" alt="" class="wp-image-36687" srcset="https://www.osradar.com/wp-content/uploads/2022/07/cry3-1024x1002.png 1024w, https://www.osradar.com/wp-content/uploads/2022/07/cry3-300x293.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/cry3-768x751.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/cry3-1536x1502.png 1536w, https://www.osradar.com/wp-content/uploads/2022/07/cry3-696x681.png 696w, https://www.osradar.com/wp-content/uploads/2022/07/cry3-1068x1045.png 1068w, https://www.osradar.com/wp-content/uploads/2022/07/cry3.png 1600w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Another type of strategy they use is to sneak in malicious software as if it were an official program. For example, a supposed application for sending and receiving cryptocurrencies that pretends to belong to a popular service. But in reality it has nothing to do with it.</p>



<h3>What to do to avoid it</h3>



<p>Therefore, as you have seen, Cryware is a threat that will put your cryptocurrencies at risk. It can attack you in different ways. Therefore, it is essential to be protected and not to make mistakes. We are going to give a series of recommendations to avoid problems and always maintain security.</p>



<h3>Common sense</h3>



<p>The first and most important thing is not to make mistakes. Common sense is essential to be protected against scams and threats of all kinds. Usually, hackers will need us to do something wrong. For example, such as clicking on a fake link, downloading something malicious, etc. If you avoid making common mistakes of this type, you stand a good chance of being protected from Cryware. As well as other similar threats that can put your cryptocurrencies or systems in general at risk.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="900" height="784" src="https://www.osradar.com/wp-content/uploads/2022/07/cry4.png" alt="" class="wp-image-36688" srcset="https://www.osradar.com/wp-content/uploads/2022/07/cry4.png 900w, https://www.osradar.com/wp-content/uploads/2022/07/cry4-300x261.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/cry4-768x669.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/cry4-696x606.png 696w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<h3>Use security software</h3>



<p>Another important point is to have a good antivirus installed. Having security applications will help us to detect threats that may reach our computers. It can warn us if accidentally we have downloaded a file that can be a Cryware or any other variety of malware. You will find many programs available that can help you. Some examples are <a href="https://www.microsoft.com/en-us/download/details.aspx?id=54795" target="_blank" rel="noreferrer noopener">Windows Defender</a>, Bitdefender, or Avast. You will certainly have both free and paid options. However, you must choose one that works well, with good reviews on the Internet.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="966" height="1024" src="https://www.osradar.com/wp-content/uploads/2022/07/cry5.png" alt="" class="wp-image-36689" srcset="https://www.osradar.com/wp-content/uploads/2022/07/cry5.png 966w, https://www.osradar.com/wp-content/uploads/2022/07/cry5-283x300.png 283w, https://www.osradar.com/wp-content/uploads/2022/07/cry5-768x814.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/cry5-696x738.png 696w" sizes="(max-width: 966px) 100vw, 966px" /></figure>



<h3>Install official software</h3>



<p>Of course, one thing you can&#8217;t miss is to install the programs from official sources. You can go directly to the website of that application and download it from there. You can also use reliable application stores, such as Google Play. This way, you will avoid installing software that may have been modified maliciously.</p>



<h3>Use physical wallets</h3>



<p>You can also consider the option of having physical wallets. Basically, it is a physical device where you will store your cryptocurrencies. This way you will have them protected at all times. The only way you will have problems is if you lose that device or for some reason it breaks down.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="928" src="https://www.osradar.com/wp-content/uploads/2022/07/cry6-1024x928.png" alt="" class="wp-image-36690" srcset="https://www.osradar.com/wp-content/uploads/2022/07/cry6-1024x928.png 1024w, https://www.osradar.com/wp-content/uploads/2022/07/cry6-300x272.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/cry6-768x696.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/cry6-696x631.png 696w, https://www.osradar.com/wp-content/uploads/2022/07/cry6-1068x968.png 1068w, https://www.osradar.com/wp-content/uploads/2022/07/cry6.png 1114w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Unlike having cryptocurrencies in online applications, in this case they will not be so exposed to possible vulnerabilities. Especially to intruders who can steal your passwords and enter your accounts.</p>



<h3>Keeping everything up to date</h3>



<p>To achieve good security, another important factor is to always keep everything updated. This should be applied to the cryptocurrency programs you use, as well as to the browser or operating system. In short, any software that can be exploited by an attacker. In the case of Windows, to update it you have to go to Start, go to Settings and access Windows Update. There you will see possible pending updates, and they will be installed automatically. This is something that you should check periodically to always have the latest versions.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="https://www.osradar.com/wp-content/uploads/2022/07/cry7-1024x787.png" alt="" class="wp-image-36691" srcset="https://www.osradar.com/wp-content/uploads/2022/07/cry7-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2022/07/cry7-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2022/07/cry7-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2022/07/cry7-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2022/07/cry7-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2022/07/cry7.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>In short, as you have seen, Cryware is a security problem that affects cryptocurrencies. They can steal from you in different ways, as well as even use your devices to mine cryptocurrencies. However, you can consider the tips we have given to improve security and protection. Bye!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-cryware-works-and-how-to-avoid-it/">How cryware works and how to avoid it.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-cryware-works-and-how-to-avoid-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cryptojacking Campaign Infected 170,000 MikroTik Routers</title>
		<link>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/</link>
					<comments>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 14:59:06 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[coinhive]]></category>
		<category><![CDATA[coinhive script]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[mikrotik]]></category>
		<category><![CDATA[mikrotik routers]]></category>
		<category><![CDATA[mikrotik vulnerability]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=5104</guid>

					<description><![CDATA[<p>Cryptocurrencies have to be mined before they’re added in the system. In this attempt, there are a number of people who invest on a large amount of hardware and mine for themselves. Hackers are also in need of money, so they also choose mining as a great source for their income. Unfortunately, in most cases, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/">Cryptojacking Campaign Infected 170,000 MikroTik Routers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrencies have to be mined before they’re added in the system. In this attempt, there are a number of people who invest on a large amount of hardware and mine for themselves. Hackers are also in need of money, so they also choose mining as a great source for their income.</p>
<p>Unfortunately, in most cases, the hackers use others’ hardware for making money for themselves. Recently, security researchers discovered a massive cryptojacking campaign that targets and infects MikroTik routers with a copy of the Coinhive in-browser mining script. As you can tell, Coinhive mining script is one of the most popular in-browser mining scripts of all times.</p>
<p>The campaign appears to have started this week and at the first stage, was mainly active in Brazil. However, as its next target, it started infecting MikroTik routers all over the world.</p>
<p>A Brazilian researcher (<a href="https://twitter.com/malwarehunterbr?lang=en">@MalwareHunterBR</a>) identified the attacks first. The attack continued growing infecting more and more routers and got the attention of Simon Kenin – a security researcher from Trustwave’s SpiderLabs division.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">another mass exploitation against <a href="https://twitter.com/mikrotik_com?ref_src=twsrc%5Etfw">@mikrotik_com</a> devices (<a href="https://t.co/4MxQbnNStA">https://t.co/4MxQbnNStA</a>)<br />
hxxp://170.79.26.28/<br />
CoinHive.Anonymous(&#8216;hsFAjjijTyibpVjCmfJzlfWH3hFqWVT3&#8217;, <a href="https://twitter.com/hashtag/coinhive?src=hash&amp;ref_src=twsrc%5Etfw">#coinhive</a> <a href="https://t.co/Nr8MA0TbzY">pic.twitter.com/Nr8MA0TbzY</a></p>
<p>— MalwareHunterBR (@MalwareHunterBR) <a href="https://twitter.com/MalwareHunterBR/status/1023893755974352896?ref_src=twsrc%5Etfw">July 30, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<h1>Numbers of infected routers</h1>
<p><img loading="lazy" class="wp-image-5107 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/200000.gif" alt="" width="621" height="242" /></p>
<p>In a <a href="https://www.trustwave.com/Resources/SpiderLabs-Blog/Mass-MikroTik-Router-Infection-%E2%80%93-First-we-cryptojack-Brazil,-then-we-take-the-World-/">report from Trustwave</a>, Kenin mentioned that the hacker(s) behind the campaign successfully compromised at least 72,000 MikroTik routers at the first stage of attack in Brazil.</p>
<p>But at the second stage, it attacked and infected more and the total number rose up to 170,000.</p>
<p><em><strong>Update</strong></em>: Using a different Coinhive key, a new campaign of similar type was ongoing. It&#8217;s not sure whether the attacker is the same or another one. In total, the number is about 200,000 of infected routers.</p>
<h1>Infection method</h1>
<p><img loading="lazy" class="size-full wp-image-5106 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/08/router-infected.png" alt="" width="768" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/08/router-infected.png 768w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-696x696.png 696w, https://www.osradar.com/wp-content/uploads/2018/08/router-infected-420x420.png 420w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Kenin also said that the hacker(s) take the advantage of a zero-day vulnerability in the Winbox component of MikroTik routers. This vulnerability was first discovered back in April this year and MikroTik fixed the problem within 24 hours. However, this doesn’t mean that all the owners of the routers took the necessary steps to apply the required patch.</p>
<p>The zero-day was dissected by a number of security researchers and in GitHub, there are public proof-of-concept codes available. Check out proof-of-concept <a href="https://github.com/mrmtwoj/0day-mikrotik">1</a> and <a href="https://github.com/BasuCert/WinboxPoC">2</a>.</p>
<p>According to Kenin, the attacker(s) took the advantage of the public codes for altering traffic passing through the router and inject a copy of Coinhive library inside all the pages that passed through the router.</p>
<p>It’s only one threat actor, according to what information was found about the attacking. All the script shared the same Coinhive key.</p>
<h1>Other users infected</h1>
<p>Kenin says that he was able to identify where some non-MikroTik users were also impacted. It happened because some Brazilian ISPs were using MikroTik as their main network and thus, the attacker(s) successfully injected malicious Coinhive mining script in a massive amount of web traffic.</p>
<p>The attacker is also smart enough to decrease the surface of the attack. If users would get a lot of trouble visiting sites, both the ISPs and users would perform investigation on what’s going on. Recently, the attacker(s) switched tactics and only injecting the scripts in error pages returned by routers.</p>
<p>This doesn’t have a downfall for the attacker as it seems. Kenin said that in recent days, he noticed the attack spreading all over the world and infected nearly as much as 170,000 MikroTik routers.</p>
<p>Thus, even if the attacking surface is only limited to error pages, there are potentially millions of daily pages for the attacker.</p>
<h1>How to stay safe</h1>
<p>If you own a MikroTik router, it’s a must that you have to <a href="https://wiki.mikrotik.com/wiki/Manual:Upgrading">upgrade your router’s firmware</a>. Don’t forget to apply all the available patches as well.</p>
<p>It’s also recommended to reset the router to system default beforehand so that it will remove any possible malicious code present in the system.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/">Cryptojacking Campaign Infected 170,000 MikroTik Routers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/cryptojacking-campaign-infected-170000-mikrotik-routers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Coinrail – Cryptocurrency Exchange Hacked</title>
		<link>https://www.osradar.com/coinrail-cryptocurrency-exchange-hacked/</link>
					<comments>https://www.osradar.com/coinrail-cryptocurrency-exchange-hacked/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Mon, 11 Jun 2018 06:11:13 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[coinrail]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=4026</guid>

					<description><![CDATA[<p>Cryptocurrencies are one of the most valuable treasures in this era. Each one of them is worth hundreds to thousands of bucks and thus, easily attracts more hackers than ever. In this attempt, hackers have successfully managed to hack a South Korean cryptocurrency exchange Coinrail. The hacker managed to make off a large amount of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/coinrail-cryptocurrency-exchange-hacked/">Coinrail – Cryptocurrency Exchange Hacked</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrencies are one of the most valuable treasures in this era. Each one of them is worth hundreds to thousands of bucks and thus, easily attracts more hackers than ever. In this attempt, hackers have successfully managed to hack a South Korean cryptocurrency exchange Coinrail. The hacker managed to make off a large amount of ICO tokens in the company’s servers.</p>
<p>The exchanged informed everyone about the hack via a message on its website where Coinrail admitted that a hacker was able to steal tokens that were issued during the ICOs of Pundi X (NPXS), Aston (ATX) and NPER (NPER) that were on trade at the time on its server.</p>
<h3>Work in progress for freezing stolen funds</h3>
<p>As soon as the intrusion was detected, the exchange put the portal in maintenance mode. The exchange confirmed that it secured and moved almost all of its cryptocurrency assets in cold storage wallets (offline).</p>
<p>Conrail is working with the affected ICO companies on the investigation of the hack. Some accounts that were about to receive the stolen funds were also frozen by other cryptocurrency exchanges.</p>
<h3>Estimated stolen fund ranges from $30 million to $40 million</h3>
<p>The exchange didn’t reveal any information on the amount of the total funds stolen. However, a prominent Bitcoin forum tracked down the attacker’s alleged addresses and believes that the total stolen fund was worth $30 million to $40 million – along with nearly 50% of the NPXS tokens.</p>
<p>According to Coinrail and the investigating companies, the hacker also stole ICO tokens from other projects like Tron (TRN) and Dent (DENT).</p>
<p>At present, due to heavy pressure from the authorities, cryptocurrency exchanges offer compensation plans for users. However, Coinrail didn’t publish any information regarding any type of compensation plans.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/coinrail-cryptocurrency-exchange-hacked/">Coinrail – Cryptocurrency Exchange Hacked</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/coinrail-cryptocurrency-exchange-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improved Methods for Avoiding In-browser Miner Detection</title>
		<link>https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/</link>
					<comments>https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 12:10:20 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptojacking]]></category>
		<category><![CDATA[in-browser miner]]></category>
		<category><![CDATA[miner]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2321</guid>

					<description><![CDATA[<p>Hackers are never the stupid ones for sure. Whenever they create a malware, it amazes us quite well. When the world learns to counter it, they improve or rewrite another malware to breach the system. That’s what happening to cryptojacking. It’s a process that uses others’ hardware resource to mine cryptocurrency and earn money without [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/">Improved Methods for Avoiding In-browser Miner Detection</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hackers are never the stupid ones for sure. Whenever they create a malware, it amazes us quite well. When the world learns to counter it, they improve or rewrite another malware to breach the system. That’s what happening to cryptojacking. It’s a process that uses others’ hardware resource to mine cryptocurrency and earn money without paying the electricity bill. In-browser mining tools are already in action, but hackers have found better techniques to hide the mining process from the system watchdogs.</p>
<p>Cryptojacking has turned into the hottest malware trend of the recent days. Hackers don’t need to break into your bank account. Instead, they can simply use your PC to make money. You pay for the energy consumption and hackers get their money free of charge. After emerging, lots of security software (antivirus, ad blockers, browser extensions etc.) are now able to detect and block cryptojacking scripts. The miner was previously loaded as JavaScript codes associated with cryptojacking servers.</p>
<p>Hackers now have found ways to work around the blocking and mine freely. Using proxy servers, crooks are now able to inject the mining code into your browser.</p>
<h3>Proxy servers helping to evade detection</h3>
<p>The most widespread and popular method of such workaround is deploying a “cryptojacking proxy server”. There’s an example available on GitHub, named <a href="https://github.com/x25/coinhive-stratum-mining-proxy">CoinHive Stratum Mining Proxy</a>.</p>
<p>These proxies allow the hackers to host the mining codes on their server (instead of CoinHive, DeepMiner, CryptoLoot servers) and load them as an anonymous JavaScript code. As you guessed, these servers are blocked by security programs by default.</p>
<p>Secondly, the proxies let the hackers to utilize a custom mining pool, featuring to detach the mining process from the parent cryptojacking service. For example, this ability ensures no fee payment to CoinHive.</p>
<p>Due to all these facilities, hackers are currently tending to use them as a defensive layer for their miners. Two security vendor company – Malwarebytes and Sucuri – have been tracking such attacks in the recent months.</p>
<p>The only way to identify the illegal mining is to check your system’s performance. If the CPU or GPU usage is pretty high, that means that a cryptojacking process is running. You can use Task Manager (on Windows) or System Monitor (on Linux) or any similar programs to check out the CPU usage regularly for any suspicious activity.</p>
<p>Hackers currently succeeded in earning $75,000 from a new campaign discovered recently. Learn more about <a href="https://www.osradar.com/new-monero-miner-earned-75000-using-5-years-old-exploit/">how hackers earned the money using a 5-years-old exploit</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/">Improved Methods for Avoiding In-browser Miner Detection</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/improved-methods-for-avoiding-in-browser-miner-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Stop Hackers from Mining Cryptocurrency on Your PC</title>
		<link>https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/</link>
					<comments>https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Sat, 03 Feb 2018 05:45:04 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[coinhive]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[miner]]></category>
		<category><![CDATA[zealot]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1709</guid>

					<description><![CDATA[<p>Cryptocurrency is a critical system of currency that works completely digital. The system is open-source and available for all but also ensures anonymity very easily. Recently, cryptocurrency miners are being loaded into web browsers that use your CPU power to mine different cryptocurrencies. What is cryptocurrency mining Before you understand how serious this issue is, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/">How to Stop Hackers from Mining Cryptocurrency on Your PC</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrency is a critical system of currency that works completely digital. The system is open-source and available for all but also ensures anonymity very easily. Recently, cryptocurrency miners are being loaded into web browsers that use your CPU power to mine different cryptocurrencies.</p>
<h3>What is cryptocurrency mining</h3>
<p>Before you understand how serious this issue is, you have to realize how cryptocurrency works. Let’s start with Bitcoin, the most popular cryptocurrency of all. The total possible number of available Bitcoin is 21 million – nothing more. But not all the coins currently exist – they have to be mined by solving different math puzzles with the help of computers. This method requires a huge hardware resource to calculate and solve all the puzzles. The solver gets Bitcoin as a reward. Mining requires an algorithm and a computer to run the algorithm.</p>
<p>Websites now use your web browser to run that algorithm and your hardware to perform the heavy job. This process is called “cryptojacking”. Many websites are using this method to earn some extra money. The perfect example is CoinHive. It uses a JavaScript tool to mine on your browser.</p>
<h3>Cryptojacking</h3>
<p>Why is cryptojacking bad? Well, it’s a controversial topic. Some think it’s okay, some think it’s bad. However, it’s a bad trait overall. Normally, cryptocurrency mining methods are HEAVILY resource-hungry. It forces your processor to work on overload and using more power. This overload work is dangerous for hardware like CPU – the more work, the more heat generation that gradually leads to permanent damage. Moreover, when browsing the website, your other works will become very slow as your CPU is busy in mining.</p>
<p>There are different websites that use such mining tool on their website. For example, The Pirate Bay (caution – it’s a torrent website with illegal content) is a torrent site. They integrated the CoinHive JavaScript to run in the web browsers of its viewers. They claim that it’s their alternative method to earn some extra money instead of showing the annoying ads. It’s the first popular website that took this measure.</p>
<p>Why would you burn your PC? There’s no need for such an overload on your computer. Cryptocurrency mining is so resource-hungry that there are numerous different mining hardware available that are specially designed for mining. PC is never a suitable solution for mining.</p>
<h3>How to stay secured</h3>
<p>By far, CoinHive is the most popular miner that websites use. However, other mining tools are always floating in websites. For blocking such heinous tools, you can use several methods.</p>
<ul>
<li><strong>Install Adblock</strong> – It’s one of the most popular extensions for all the browsers. There’s a default cryptocurrency blocking method available. The extension is available for Chrome, Firefox, Opera, Safari, and Edge. <a href="https://getadblock.com/">Get Adblock</a>.</li>
<li><strong>Use a security solution</strong> – Security vendors are always checking the web for cyber issues. By default, a security software will block the mining tool from the web. CoinHive successfully fooled a few security software, but all the companies are always evolving to defend the latest threats. Check out the <a href="https://www.osradar.com/best-antivirus-software-2018/">top 10 security solutions</a>.</li>
<li><strong>Block CoinHive</strong> – CoinHive is the most popular one in such actions. The file that is used can be blocked using custom filters. Block “coin-hive.com/lib/coinhive.min.js” <a href="https://adblockplus.org/en/filters#basic">using Adblock Plus</a>.</li>
</ul>
<h3>The bottom line</h3>
<p>Fortunately, the tool doesn’t steal sensitive info. Recently, other malicious miner tools are affecting PCs. Zealot is one of them. Learn more <a href="https://www.osradar.com/zealot-new-spooky-cryptocurrency-miner/">how to stay protected from Zealot</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/">How to Stop Hackers from Mining Cryptocurrency on Your PC</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/stop-hackers-mining-cryptocurrency-pc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bitcoin &#038; Cryptocurrencies under Attack from Hackers – Stay Safe</title>
		<link>https://www.osradar.com/bitcoin-cryptocurrencies-under-attack-from-hackers-stay-safe/</link>
					<comments>https://www.osradar.com/bitcoin-cryptocurrencies-under-attack-from-hackers-stay-safe/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 07:48:50 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[bitcoin hack]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[etherium]]></category>
		<category><![CDATA[nicehash]]></category>
		<category><![CDATA[nicehash hack]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1375</guid>

					<description><![CDATA[<p>Bitcoin – we all are familiar with this name. It&#8217;s so popular that it has become a synonym of cryptocurrency. Bitcoin was the first and now, the biggest in the market. Although there are many conspiracies and controversies whether Bitcoin is good or bad, it’s gaining more and more popularity. Bitcoin is supposed to be [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/bitcoin-cryptocurrencies-under-attack-from-hackers-stay-safe/">Bitcoin &#038; Cryptocurrencies under Attack from Hackers – Stay Safe</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Bitcoin – we all are familiar with this name. It&#8217;s so popular that it has become a synonym of cryptocurrency. Bitcoin was the first and now, the biggest in the market. Although there are many conspiracies and controversies whether Bitcoin is good or bad, it’s gaining more and more popularity. Bitcoin is supposed to be pretty safe in security. Unfortunately, in the past week, Bitcoin saw the biggest hack in its history – almost $60 million worth of Bitcoin stolen. The money was hacked from NiceHash, a Slovenian-based cryptocurrency (mostly Bitcoin) mining company.</p>
<h3>What is NiceHash?</h3>
<p>NiceHash is a company that allows users to buy “hashing power” – computers to mine more and more Bitcoin and other cryptocurrencies. If you don’t know what mining is, it’s the process of verifying Bitcoin transactions and adding to the public ledger. This process also adds more Bitcoin to the system. From the profit, users get rewards Bitcoin added to their account.</p>
<h3>The effect of the incident</h3>
<p>This incident has divided the NiceHash cryptocurrency community into 2 groups – one blaming the company for their competence and another deciding to stick with NiceHash. According to Will M. by the Reddit username bitbug42, had about 1.2 BTC (~ $20,000) on his account. He said, “It’s like if a human forgot to close the vault’s door, I blame the human error, not the lock machinery”.</p>
<p>The attack was highly professional with sophisticated social engineering, confirmed by NiceHash. NiceHash is investigating the situation and will release updates accordingly. Reddit users noted on a specific wallet that contains more than $60m on its account and most people suspects the account as the thief. The account is <a href="https://bitinfocharts.com/bitcoin/address/1EnJHhq8Jq8vDuZA5ahVh6H4t6jh1mB4rq">publicly available to view</a>.</p>
<p>Another major incident that took place is a flaw in the Parity Technologies wallet system. A novice hacker accidentally (intentionally, maybe?) deleted a library from the code that was necessary to access the money stored in the digital wallet. Due to the situation, a good number of accounts got frozen, having around $150 million in the account. To unfreeze the account, work is still in progress. Specialists are suggesting a hard fork for the ledger. This would restore the ledger with the previous code, the only possible way now for unfreezing the account.</p>
<p>This is only some of the major attacks upcoming in the future. As Bitcoin is the most successful cryptocurrency and its price is becoming higher and higher, it’s time to take action to protect yourself against any security threat.</p>
<p>Bitcoin is a cryptocurrency, meaning that it isn’t literally possible to hack and transfer all the money. Instead, hacking the clients’ devices is a lot easier, with the newest discoveries of unforgivable security holes in systems.</p>
<h3>What to do now</h3>
<p>1. Use a unique email to your digital wallet for cryptocurrency exchange.</p>
<p>2. Assign a really strong &amp; long password that none can access. Longer passwords will take more time for hackers to break down.</p>
<p>3. Enable maximum protection in your mobile device. It’s better not to use text messages as a 2-factor authentication.</p>
<p>4. Try to buy cryptocurrencies across multiple exchanges.</p>
<p>5. Keep your cryptocurrency offline. For example, you can buy a hardware wallet that’s designed specifically for creating transactions.</p>
<p>6. For exchanging Etherium, try to look into decentralized exchanges.</p>
<p>Above all, stay alert of any type of suspicious activities. Cryptocurrencies, for their limited supply, is highly valuable and the value is increasing day by day. The value is highly volatile as well, meaning that it fluctuates a lot. In order to secure your money, keep your devices and yourself secured and that’s the only way now.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/bitcoin-cryptocurrencies-under-attack-from-hackers-stay-safe/">Bitcoin &#038; Cryptocurrencies under Attack from Hackers – Stay Safe</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/bitcoin-cryptocurrencies-under-attack-from-hackers-stay-safe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>KodakCoin – The Latest Cryptocurrency Convert</title>
		<link>https://www.osradar.com/kodak-latest-cryptocurrency-convert/</link>
					<comments>https://www.osradar.com/kodak-latest-cryptocurrency-convert/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Thu, 11 Jan 2018 07:53:00 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[Kodak]]></category>
		<category><![CDATA[KodakCoin]]></category>
		<category><![CDATA[KodakOne]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1202</guid>

					<description><![CDATA[<p>Cryptocurrency is one of the most popular ways for money exchange in the modern world. It’s secured, powerful and very reliable on its own. Moreover, its decentralization makes it even more popular. Kodak, known as one of the leading platforms for photography, recently announced their interest in cryptocurrency and willing to start their own currency. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/kodak-latest-cryptocurrency-convert/">KodakCoin – The Latest Cryptocurrency Convert</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cryptocurrency is one of the most popular ways for money exchange in the modern world. It’s secured, powerful and very reliable on its own. Moreover, its decentralization makes it even more popular. Kodak, known as one of the leading platforms for photography, recently announced their interest in cryptocurrency and willing to start their own currency.</p>
<p>Kodak, according to its original purpose, it’s a company that produces imaging products with its historic basis on photography. Kodak’s main business segments include enterprise inkjet systems, micro 3D printing, and packaging, print systems etc. Kodak is best known for their top class photographic film products. They’re also going to have a new service – cryptocurrency.</p>
<h2>Why Bitcoin is popular</h2>
<p>Bitcoin is, by far, the most popular cryptocurrency. Its popularity is so far and wide that Bitcoin itself is the alternative of cryptocurrency. The value of every Bitcoin has been steadily rising upwards.</p>
<p>More and more people are using Bitcoin. Its technical details are a bit complex, so here’s the summary. Bitcoin is available up to a fixed number. It’s because the system allows more Bitcoins only by mining. At the current system, on 21 million Bitcoins can be present – no more. However, people using more and more Bitcoins is expected to increase its value, and that’s what we’re seeing. <a href="https://www.coindesk.com/price/">Check out the latest price of Bitcoin</a>.</p>
<p>Bitcoin supply is limited and its price is really good. By far, it’s the most successful cryptocurrency. There’re others like Ethereum, Ripple, NEM, Cardano etc.</p>
<h2>Why moving towards cryptocurrency</h2>
<p>It’s really interesting that company like Kodak is releasing its own cryptocurrency now. The reason? It’s the success of Bitcoin, according to major speculations. It’s not so surprising that another company simply jumped into the world of cryptocurrency.</p>
<p>The ground is still holding towards photographers, though. Kodak is intending to popularize their new cryptocurrency, named KodakCoin, to be available for photographers.</p>
<p>Kodak is going to launch its own blockchain tech with KodakCoin and KodakOne. A short note – blockchain is a ledger system that keeps the record of all the transactions of all the digital currencies.</p>
<p>Photographers will be able to register their works under Kodak and license under their agreements. Kodak will provide payment to them via the KodakCoin. According to CEO Jeff Clarke, this KodakCoin will help the photographers to get the surety of secured and trusted income. He also added that this step will allow photographers to take control over their hard works and maintain a control over the system. This would create a new economy for the photographers for receiving and selling work on a secure platform.</p>
<p>Kodak’s share, KODK, has already seen the effect of this step. Currently, the price of the share has gone skyrocket. According to the current time, it’s seen a rise of 57.35%, growing the price up to $10.70.</p>
<p>The initial KodakCoin will be available to the customers on January 31st, 2018.</p>
<h2>Things to keep in mind</h2>
<p>KodakCoin is just entering the marketplace. It’s also awaiting potential investors to establish a strong fund. However, there are several concerns that you need to keep in mind before jumping towards KodakCoin and ultimately, every cryptocurrency.</p>
<ul>
<li>There’s no rules and regulations how these virtual currencies work. The nature of the transactions also makes it difficult to trace.</li>
<li>The value of any cryptocurrency is highly volatile. For example, Bitcoin saw a fluctuation of its price up to $2,000 within a couple hours.</li>
<li>The investors are one of the prime targets of hackers and other criminals for stealing their crypto-cash online.</li>
</ul>
<h2>The dark side of Kodak</h2>
<p>KodakCoin is a pretty surprising. However, there are more controversies about this new project.</p>
<p>First of all, there’s always a possibility of a bubble in any cryptocurrency. This is a possibility when the price of a cryptocurrency rises way up than expected. People will start collecting money, and all of a sudden, the prices go down. As there’s no rules &amp; regulations for cryptocurrencies, it’s pretty possible.</p>
<p>KodakCoin&#8217;s another dark factor is RYDE coin. It’s strongly suspected that KodakCoin is the re-branding of an initial coin called RYDE coin. It didn’t get much popularity and shutted down just before a few days before Kodak announced their KodakCoin. RYDE coin was initially created by WENN Media, a paparazzi photo company.</p>
<p>RYDE crowdfunding project was led by Jan Denecke as the SEO. Now, KodakOne will have him as the SEO of the project. Fortunately, Google managed to <a href="https://webcache.googleusercontent.com/search?q=cache:hp219DhY7ZIJ:https://www.startengine.com/wenn+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us">take a cache</a> of the WENN website. It says that RYDE coin is coming back in 2018.</p>
<p>Another suspicious thing is the Kodak KashMiner. It’s a Bitcoin miner, according to Kodak. Spotlite, the company who’s licensing Kodak for this business, will split the profit into 50-50. One of the basic tenets of Bitcoin miners is that it becomes more and more difficult. The initial investment requires $3,400. The company says that over the next 2 years, you’ll be able to earn $9,000 total! The price of Bitcoin is highly volatile and due to the increased difficulty of Bitcoin mining, there&#8217;s no guarantee that it’ll  be enough to cover up all the costs. According to a Bitcoin specialist, the final outcome could only be $2,457.</p>
<p>You must stay highly alert to these side effects.</p>
<h2>The bottom line</h2>
<p>It’s the nature of cryptocurrencies to become more and more valuable. The success of Kodak’s KodakCoin will depend on the level of investment, the level of “reserves” of the coin and the release rate. With the rise of KodakCoin, it’s a matter of time to find out its worth – whether it’ll compete with Bitcoin or be just another common cryptocurrency. Be cautious and stay put if you’re willing to get a part of KodakCoin.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/kodak-latest-cryptocurrency-convert/">KodakCoin – The Latest Cryptocurrency Convert</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/kodak-latest-cryptocurrency-convert/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
