Crypto Scammers Attack Porn Lovers

porn site viewers blackmail

The number of people who prefer to get hold of digital assets by stealing them is getting larger and larger. Moreover, the criminals in this sphere are becoming quite creative. This time the aim of scammers was the people who enjoy watching porn videos.

A bunch of viewers received a suspicious email from unknown people. The letter claimed that the attackers had videos from webcams of these viewers while they were watching adult videos. The criminals have supposedly installed a remote control program on the victims’ computers and filmed them secretly.

The letter also had a Bitcoin wallet address, where the payment in the amount of a little less than $2 thousand had to be transferred. Otherwise, the attackers threatened to reveal the videos. Bitcoin was chosen as the means of payment due to the fact that it is very easy and quick to transfer.

Even though, many people were pretty scared by this letter, it is likely to be a scam. The criminals did not even have a list of porn sites, the viewers of which became victims. Frankly speaking, it did not include any specific information which makes the whole situation quite doubtful.

The professor from the Cornell University posted an example of such a scam on his Twitter account.  

Experts advise people who became victims of crypto scammers not to react to their  messages and by any means not to send them money, since 99.9% of such attacks are just pure bluff. The attackers who can really break into security systems and steal digital assets are mostly aiming at large cryptocurrency exchanges.

We would like to remind you that the site Pornhub now accepts three digital currencies as a means of payment for videos and premium accounts.

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Malware From The Pirate Bay May Hijack Website To Steal Crypto

The movies downloaded from The Pirate Bay bring a malware to the user’s computer. That was the conclusion reached by a security researcher, with the nickname  0xffff0800 in Twitter. He told that when he downloaded a movie ‘The Girl In The Spider’s Web’ from TPB, a .LNK shortcut with CozyBear malware got to his computer.

However, the Cozy Bear malware is just a decoy, the real thing that brings damages is Powershell commands. Once the malware reaches the computer, it carries out malicious actions, like disabling Windows Defender and installing viral extensions in Firefox and Chrome browsers. Moreover, it edits the appearance of the website on the user’s computer.

The movie is an application itself which links the computer to the external malicious servers.

Source: Bleeping Computer

Moreover, the newly installed viral extensions can modify the JavaScript code and add some advertisements to the main page, like it is shown below.

Source: Bleeping Computer

What is the most dangerous is that the malware can edit the appearance of the web page and add or change the information without the user’s awareness, this ability allows the malware to steal the crypto. For example, if the user open Wikipedia page on a compromised system, he/she is likely to see the message saying “Wikipedia now accepts donations in form of bitcoin” and a ‘DONATE’ sign. All the donations will go to the hacker.

Source: Bleeping Computer

In addition, the malware is able to change crypto wallet addresses provided on the pages. Unfortunately, you will not even notice how the hacker stole your money.

We remind you

YouTube Will Remove All Videos with Dangerous Pranks and Challenges

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Cryptopia Got Hacked, Crypto Exchange Is Suffering “Significant Losses”

One of the best crypto exchanges of New Zealand, Cryptopia, was hacked. It announced this sad news via Twitter stating that it had experienced a security breach that ended in a “significant loss”. However, the company did not mention any figures of the loss.

Cryptopia has suspended all the activities on the trading platform for an indefinite period. In addition, it has notified the authorities of the country, and now it cooperates with the police and the country’s High Tech Crimes Unit in order to investigate the hacker attack.

“Staff then notified and involved the appropriate Government Agencies, including NZ police and High Tech Crimes Unit who are jointly and actively investigating the matter as a major crime and they are assisting us with advice,” the exchange stated.

This is the first cryptocurrency exchange theft in 2019, however, many customers of different crypto exchanges call into question the security of them, as there were so many incidents that had to teach exchanges how to deal with it. Some users even blame the exchanges, in particular Cryptopia, in a bear market “exit strategy”.

We remind you

The Hackers of the “51% Attack” on Ethereum Classic Returned Half of the Stolen Funds

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

The Hackers of the “51% Attack” on Ethereum Classic Returned Half of the Stolen Funds

The alleged organizer of the “51% Attack” on the ETC network transferred back $ 100,000 to Gate.io. bitcoin exchange. It was stated by its representatives on their Twitter account:

As a result of the attack, the users of the Hong Kong Stock Exchange had lost about 46,000 ETC. The representatives of the exchange were going to recover the money lost at their own expense.

However, last Saturday, Gate.io reported that an unknown hacker returned about half of the stolen funds. The company tried to contact the hacker. So far, the reasons he returned the funds have not been clarified since the hacker have not responded.

The representatives of the exchange guessed that if the organizer did not seek to profit, it could be a white hacker who wanted to remind people of the risks. Gate.io also noted that the current hashrate of the ETC network is not high enough, which means that the attack might happen again.

Now a successful transaction in the Ethereum Classic network on Gate.io requires about 4000 confirmations. The exchange is confident that this measure will enhance security and recommends other crypto platforms to stick to such measure to protect traders.

We remind you that despite the significant losses of the Gate.io users, the hackers used a simple hacking algorithm:

«Атака 51%» на Ethereum Classic: полный анализ взлома

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

Swedish Scammers Try to Sell Fake National Cryptocurrency

The main bank of Sweden, Riksbank, is warning its customers and all citizens of the country about the scam cryptocurrency roaming around – a fake e-krona.

On certain websites and in social media, false information is circulating claiming that the Riksbank is selling e-kronas,” is stated on the official site of the bank.

In fact, the project of launching a state-run digital currency appeared back in 2017. This is due to the fact that less and less Swedish people are using physical money when buying things.

Experts say that by 2025 half of all establishments in the country will stop accepting cash.

Meanwhile, the official project of e-kronas is still in the making, a lot of things have to be finished, thus, the Swedish cryptocurrency will not come out any time soon.

Riksbank warns that any person who claims to be selling e-kronas, especially on behalf of the bank, is a fraudster.

We remind you:

The Most High-Profile Scam Projects of 2018

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

The CEO of Circle Believes That a Clearer Policy of the SEC Will Cure the Crypto Industry

The CEO of the project Circle, backed up by the major bank Goldman Sachs, Jeremy Allaire started a thread on Reddit together with his co-workers, where they debated the accomplishments of the company in the recent time, talked about prospects for the future and discussed the overall situation on the crypto market.

According to the representatives of Circle, one of the main issues with crypto in the US is the lack of regulatory framework and, most importantly, the inability of the Securities and Exchange Commission to clearly define cryptocurrencies as belonging to a particular type of assets.

We remind you:

The SEC: Unlike ICO Tokens, Bitcoin and Ethereum Can Not Be Securities

There absolutely needs to be more regulatory clarity to really make this fly — in particular around who can issue these, how they can be stored and transmitted, and what markets can allow their trading. There’s a lot of attention on this and we absolutely expect to see these issues resolved and for far more real world experiments to hit the markets this year,” said Jeremy Allaire.

Also, the CEO of Circle claimed that the US should follow the example of France and have a separate kind of taxation for crypto-to-crypto transactions.

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/

“51% Attack” Hit Ethereum Classic: A Full Analysis Of The Process

As we have reported earlier, Ethereum Classic was hit by 51% attack, it means that hackers obtained more than 50% of network’s mining hashrate.

A Malicious “51% Attack” Hit Ethereum Classic, The Loss Allegedly Accounts For $460 000

Slowmist, Chinese-based blockchain journal, has released a full report on the attack. The earliest hit occured on January 5, the culprit hacked some exchanges, like Bitrue, Coinbase, Gate.io, however, this was noticed only two days later.

The first action was a transfer of more than 5000 ETC from Binance to the criminal’s address 0x24fdd25367e4a7ae25eef779652d5f1b336e31da. This amount of coins moved to a mining node, that created block 7254355. After that, the hacker deposited 4000 ETC to Bitrue exchange in block 7254430, yet, this transaction vanished from the Ethereum Classic chain. Another 9000 ETC was stolen in the same way. The Bitrue address 0x2c9a81a120d11a4c2db041d4ec377a4c6c401e69 no longer exists, and the official history is clear. Though, Bitrue managed to save some records:

The scheme of the hacker attack is simple:

  • make a deposit;
  • withdraw to a safe address;
  • to double coins – just move the coins to other addresses.

One of the biggests victims is Coinbase exchange. It was estimated that the loss from the attack accounts for $1 million. The above-mentioned report also provides the information about two attacker addresses which were blackmailed by Coinbase later. They are:

– 0x090a4a238db45d9348cb89a356ca5aba89c75256
0x07ebd5b21636f089311b1ae720e3c7df026dfd72

In Twitter, one of users (nickname: @OGBTC) claimed that he knew the culprit personally.

https://twitter.com/OGBTC/status/1082559086070136832

Another user (nickname: @sebseb7) indicated that it was he who knew the hacker.

The “51% Attack” is over for now. All we can do is to estimate the losses and to take measures so that it will not happen again.

The report also stated:

“[W]e recommend that all digital asset services platform block transfers from the above malicious wallet addresses. And strengthen the risk control, maintain a high degree of attention, and be alert to double spend attacks that may erupt at any time.”

We remind you:

The Dark Overlord Threatens To Reveal The Truth of 9/11 Attacks Unless Ransom in Bitcoin is Paid

Subscribe to The Coin Shark news in Facebook: https://www.facebook.com/coinshark/