Remove Backups Remove Cryptocurrency Remove Passwords
article thumbnail

“Can you try a game I made?” Fake game sites lead to information stealers

Malwarebytes

If interested, the victim will receive a download link and a password for the archive containing the promised installer. It specializes in stealing credentials stored in most browsers, session cookie theft for platforms like Discord and Steam, and information theft related to cryptocurrency wallets.

Scams 140
article thumbnail

Cryptocurrency exchange BuyUcoin hacked, data of 325K+ users leaked

Security Affairs

Indian cryptocurrency exchange Buyucoin suffered a security incident, threat actors leaked sensitive data of 325K users. A new incident involving a cryptocurrency exchange made the headlines, the India-based cryptocurrency exchange suffered a security incident, threat actors leaked sensitive data of 325K users on the Dark Web.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 496 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

article thumbnail

REvil Ransomware Gang Starts Auctioning Victim Data

Krebs on Security

“Others have gotten the message about the need for good backups, and probably don’t need to pay. A report published in mid-April by cryptocurrency research firm Chainalysis found that ransomware payments “have decreased significantly since the COVID-19 crisis intensified in the U.S. and Europe in early March.”

article thumbnail

Deceptive Google Meet Invites Lures Users Into Malware Scams

eSecurity Planet

Matanbuchus and XMRig: Used for cryptocurrency mining, these malware strains can slow down systems while surreptitiously utilizing computing resources. These groups are considered sub-teams of larger cryptocurrency scam networks, highlighting the organized and systematic nature of these phishing attacks.

Scams 124
article thumbnail

Attackers distributing a miner and the ClipBanker Trojan via SourceForge

SecureList

The infection chain: from searching for office software to downloading an installer The downloaded archive contains another password-protected archive, installer.zip , and a Readme.txt file with the password. The installer files lack an archive password. This file contains the password for the RAR archive.

article thumbnail

GUEST ESSAY: Securing your cryptocurrency — best practices for Bitcoin wallet security

The Last Watchdog

Over time, Bitcoin has become the most widely used cryptocurrency in the world. Use strong passwords, 2FA. The security of your Bitcoin wallet is mostly dependent on the strength of your passwords. Use uppercase, lowercase, digits, special characters, and a combination of them to create strong, one-of-a-kind passwords.