What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Cryptocurrency

S3 Ep37: Quantum crypto, refunding Bitcoins, and Alpaca problems [Podcast]

by Paul Ducklin [03’22”] Will quantum cryptography mean the end of encryption?   [10’30”] How was the FBI able to get bitcoins back in the Colonial Pipeline ransomware case?   [25’00”] What is the ALPACA attack, and does it make your browsing less secure?   [25’00”] Oh! No! of the week. With Kimberly Truong, Doug Aamoth . . . Read more

How could the FBI recover BTC from Colonial’s ransomware payment?

by Paul Ducklin The cybersecurity buzz of the week is the intriguing – and highly unusual – aftermath of the Colonial Pipeline ransomware attack. Colonial runs the largest American supply pipeline for refined petroleum products, capable of shifting about 500 million litres of various fuels, including gasoline (petrol), jet fuel, . . . Read more

Tempted by cryptocoins? Fake trading apps get personal…

by Paul Ducklin Remember how ransomware started? It was all about volume. The CryptoLocker gang, for example, raked in millions of dollars, perhaps even hundreds of millions, by scrambling your files and then extorting you for $300 to unscramble them again. These days, however, the big-money ransomware gangs take a . . . Read more

S3 Ep21: Cryptomining clampdown, the 100-ton man, and ScamClub ads [Podcast]

by Paul Ducklin The graphics card that wants you to stick to playing games, the man that didn’t weigh 100 tons after all, and the marketing gang that used a browser bug to bombard iPhone users with scammy online surveys. With Kimberly Truong, Doug Aamoth and Paul Ducklin. Intro and . . . Read more

ElectroRAT Drains Cryptocurrency Wallet Funds of Thousands

At least 6,500 cryptocurrency users have been infected by new, ‘extremely intrusive’ malware that’s spread via trojanized macOS, Windows and Linux apps. A new remote access tool (RAT) has been discovered being used in an extensive campaign. The attack has targeted cryptocurrency users in an attempt to collect their private . . . Read more

Gitpaste-12 Worm Widens Set of Exploits in New Attacks

The worm returned in recent attacks against web applications, IP cameras and routers. The Gitpaste-12 worm has returned in new attacks targeting web applications, IP cameras and routers, this time with an expanded set of exploits for initially compromising devices. First discovered in a round of late-October attacks that targeted Linux-based . . . Read more

Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes

While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense. Predicting the future is always an iffy proposition.  There’s the Nostradamus route, making predictions so cryptic and vague they could mean just about . . . Read more