article thumbnail

A Cryptomining botnet abuses Bitcoin blockchain transactions as C2 backup mechanism

Security Affairs

Crooks are exploiting BTC blockchain transactions to hide backup command-and-control (C2) server addresses for a cryptomining botnet. Security experts from Akamai have spotted a new botnet used for illicit cryptocurrency mining activities that are abusing Bitcoin (BTC) transactions to implement a backup mechanism for C2.

article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

However, these attacks aren’t due to exchange security flaws; malicious actors are exploiting the underlying consensus protocols of blockchains themselves. Every blockchain uses a consensus protocol which allows all nodes on the network to agree on the current state of the blockchain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 2 February 2018. After all, why lock users’ machines and demand a ransom that they might not even pay when you can just infect their machine with software that mines for cryptocurrency without their knowledge? Wait a moment – cryptocurrency mining ? What’s that?

Mining 66
article thumbnail

To get the most from blockchain in government, a sharing mindset is needed

CGI

To get the most from blockchain in government, a sharing mindset is needed. Mon, 05/14/2018 - 00:45. Twenty-five years later, blockchain is here and can bring those use cases to life. Once a piece of data or transaction is written to a blockchain, it cannot be erased or modified. ACT-IAC guidance. federal government.

article thumbnail

INVDoS, a severe DoS issue in Bitcoin core remained undisclosed for two years

Security Affairs

Fuller discovered that the INVDoS flaw could be exploited by an attacker by using malformed Bitcoin transactions that, when processed by Bitcoin blockchain nodes, would lead to uncontrolled memory resource consuption, which would trigger a DoS condition (i.e. Two years ago, the Bitcoin protocol engineer Braydon Fuller. server crash).

article thumbnail

Jisc Futurist Q&A ? and 25 per cent off ILI Conference 2018

CILIP

Big Data, Blockchain and Artificial Intelligence are all in the headlines ? one is to add blockchain to just about any project to make it seem all magical and sparkly, and the other is to treat just about anything done by a computer as ?AI? Internet Librarian International 2018:The Library Innovation Conference. ? experience.

article thumbnail

The Sheriffs are in Town: Recent Developments in Initial Coin Offerings (ICO) Enforcement and Investor Education

Data Matters

This post highlights three important regulatory updates: On August 14, 2018, the Securities and Exchange Commission (SEC or Commission) issued an administrative order, In the Matter of Tomahawk Exploration LLC and David Thompson Laurance , taking action against an unregistered and fraudulent initial coin offering (ICO). securities laws.