• Tue. Oct 17th, 2023

Esme Greene

Esme brings a wealth of knowledge and experience to our website, specializing in all aspects of DarkWeb security. With a deep understanding of the intricate workings of the DarkWeb and its associated cybersecurity risks, Esme curates insightful and informative content for our readers.
  • Home
  • North Korean Hackers Learned to Launder Bitcoin through the Cloud Mining

North Korean Hackers Learned to Launder Bitcoin through the Cloud Mining

The North Korean cyber attackers group APT43 has started using cloud mining providers to launder stolen cryptocurrency. According to researchers from Mandiant, the hackers rent computing power from data centers…

Sakhalin Resident’s State Services Account Hacked by Fraudsters and Linked to SSO

On the Gosuslugi portal, fraudsters gained access to the account of a 50-year-old Sakhalin man and registered him as a volunteer for a Special Military Operation. According to the press…

New Sword2033 Backdoor Passes off Chinese Attacks as South African Military 

Chinese attackers’ most recent online spying attempts target Linux using new malware versions. Researchers have identified “Sword2033” as a backdoor and a new PingPull ransomware version as tools used by…

The Hackers Stole $10 Million From Yearn

Yearn decentralized finance (DeFi) protocol has recently been targeted by attackers, resulting in a loss of more than $10 million in stablecoins. According to the experts from the cybersecurity company,…

What is Encryption? Top Encrypted Messengers – Part One

Most communication nowadays occurs online, which is why it’s important to use safe and trustworthy platforms. Below is a list of the most reliable encrypted messengers we’ve compiled. What is…

Hackers Target Russia in New Infected Tor Browser Malware Campaign

Attackers have already stolen $400,000 in cryptocurrencies. Unknown hackers launched a malware campaign that targeted more than 15,000 users in 52 countries and resulted in the theft of over $400,000,…

FBI urged against using public charging stations

Using ports infected with malware can lead to device hacking and tracking The FBI is warning against using public charging stations due to the risk of device hacking and tracking.…

Crypto Businesses Are the Subject of a Complex 3CX Supply Chain Attack

The offensive who launched the chain attack on 3CX used a second-stage implant to strike only several cryptocurrency businesses. Seeing a rise in assaults in March 2023, which matched with…

Crypto Users from Portugal Are Victims of the New Harmful Program Called CryptoClippy

A new malware with the alias CryptoClippy is aimed at Portuguese users and is designed to steal cryptocurrencies as part of a phishing operation. Based on the Palo Alto Networks…

Iranian Hackers Caught Executing Dangerous Attacks While Posing as Ransomware

Iran’s MuddyWater state criminal gang has been observed carrying out destructive operations against hybrid environments while masking their activities as a ransomware campaign. Recent research from the Microsoft Security Intelligence…