article thumbnail

Illegal Content and the Blockchain

Schneier on Security

Now the content-delivery network Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger. Since the blockchain is globally accessible and hard to take down, the botnet’s operators appear to be safe. What if someone puts illegal material in the blockchain? Most Bitcoin mining happens in China.

article thumbnail

A Cryptomining botnet abuses Bitcoin blockchain transactions as C2 backup mechanism

Security Affairs

Crooks are exploiting BTC blockchain transactions to hide backup command-and-control (C2) server addresses for a cryptomining botnet. Security experts from Akamai have spotted a new botnet used for illicit cryptocurrency mining activities that are abusing Bitcoin (BTC) transactions to implement a backup mechanism for C2.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

Related: Wildland restores control of data to individuals. However, these attacks aren’t due to exchange security flaws; malicious actors are exploiting the underlying consensus protocols of blockchains themselves. Unsurprisingly, the $3B blockchain suffered three 51% attacks over the summer.

article thumbnail

Conti Ransomware Group Diaries, Part IV: Cryptocrime

Krebs on Security

One Conti top manager — aptly-named “ Stern ” because he incessantly needled Conti underlings to complete their assigned tasks — was obsessed with the idea of creating his own crypto scheme for cross-platform blockchain applications. “Like Netherium, Polkadot and Binance smart chain, etc.,” We release ddos.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

A major focus of cybersecurity as an industry is its efforts to detect, root out, and respond to potential fraudsters attempting to trick companies and people out of their money, data, or both. According to data from the Federal Reserve , the 55-69 age group currently controls 41.2% So why do scammers go after older individuals more?

article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Data breaches don’t just occur when cyber criminals hack your systems, and it’s as well to remember that sensitive information in all forms – including hard copy records – should be afforded appropriate protection. This is part of Principle 1 in the Data Protection Act, which states that ‘Personal data shall be processed fairly and lawfully’.

Mining 66
article thumbnail

FRANCE: CNIL publishes initial analysis on Blockchain and GDPR

DLA Piper Privacy Matters

Many questions surround the Blockchain’s compatibility with EU General Data Protection Regulation (GDPR). The CNIL is one of the first EU data protection supervisory authorities to provide guidance on the compliance of Blockchain with GDPR. What solutions for a responsible use of Blockchain involving personal data?