Hackers Invade Stealing Cryptocurrencies.

Everyone knows that making investments is risky, so that the values of the stock market in companies and currencies rise and fall constantly, becoming a real uncertainty for investors. Therefore, at present, the cryptocurrency market has increased, largely as bitcoin, because users are dedicated to invest large amounts of money, but cyber criminals closely monitor the development of this market.

In this way, a hacker is a person who by his advanced knowledge in the area of computer science (programming languages, hardware and software manipulation, telecommunications) is capable of carrying out challenging and illicit activities from a computer, so he steals data and scam becoming a cybercrime. In turn, cryptocurrencies are digital assets that constitute an excellent target for hackers and cyber pirates from around the world, who have found various methods to steal cryptocurrencies.

In this sense, hackers are testing more sophisticated attack tools such as EternalBlue, the WannaCry exploit created by the National Intelligence Agency of the United States (NSA) and that was leaked by the hacker group The Shadow Brokers.

Consider some examples of cryptocurrency theft through hackers, the first of which is described by the cyber security company VOTIRO Secured. Which was that he found a flaw in the function recently introduced by Microsoft Word called Online video, in which the code of a video is inserted inside the document that is being edited from the Internet website, which is used by hackers to insert in the document a special JavaScript code that contains a miner. When the user opens the integrated video in Word through Internet Explorer, the digital money extraction process is launched. Word documents with dangerous code are disseminated through ‘spam’.

Another example is that a malicious mining software was found distributed through Telegram, according to the official statement of the security company Kaspersky, it is a virus of the type “In the wild”, in which it spreads from a computer to another in the middle of routine operations.

The Telegram vulnerability is based on the RLO (Right to Left Override) method, which is integrated in Windows to deal with the programming languages that are written and read from right to left, such as the Arabic or Hebrew language, and that can to be used to hide false file extensions, disguising the malicious files so that they look normal and that users fall victim executing these programs. To avoid this, it is important not to download files from unknown sources and avoid sharing sensitive information, such as passwords, in instant messaging applications and social networks.

On the other hand, Tesla joins the growing list of victims of the cryptocurrency mining by hackers. The hackers infiltrated and made use of the cloud servers of the electric vehicle manufacturer to illegally mine cryptocurrencies. The cyber attack also exposed private company data. In addition, when accessing they also managed to obtain the Tesla credentials in the Amazon Web Services servers.

Another case is the one of BitGrail, the Italian cryptocurrency exchange platform, announced that it had stolen 17 million of the Nano cryptocurrency, or the equivalent of $ 170 million. The money disappeared from BitGrail’s own portfolios, where the money is saved after users deposit the cryptocurrency in their accounts.

Likewise, a hacker steals around $ 7.4 million dollars in ether, the cryptocurrency that supports the Ethereum App platform, tricking victims into sending money to the wrong address during an Initial

In turn, the Japanese platform Coincheck reported that hackers had stolen cryptocurrencies worth approximately $ 500 million. The South Korean intelligence agency suspects that North Korea may be behind the theft of Coincheck. For its part, The Pirate Bay and Plusdede, are pages that have been accused of mining cryptocurrencies using the users’ CPU.

Likewise, a hacker steals around $ 7.4 million in ether, the cryptocurrency that supports the Ethereum App platform, tricking victims to send money to the wrong address during an Initial Coin Offering, or ICO, which translated Literally to Spanish means Initial Currency Offer. This is according to a company called Coindash that says its investors were sending their funds to a hacker.

Therefore, they must be very cautious and have distrust of the online services where they store bitcoins, be they of the type they are: purses, exchange houses, bets, they must encrypt their private keys, use double authentication, make backup copies, use multifirm addresses , always verify the web address of a wallet, do not follow links to Internet banks or web wallets, check the address of the recipient (at least the first and last characters), the amount to be sent and the commission, use a custody service and keep active quality antivirus protection to protect the devices they use to access cryptocurrencies, make currency changes, among others.

Reference: profesionalreview

Disclaimer: InfoCoin is not affiliated with any of the companies mentioned in this article and is not responsible for their products and / or services. This press release is for informational purposes information does not constitute investment advice or an offer to invest.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *