article thumbnail

Conti Ransomware Group Diaries, Part IV: Cryptocrime

Krebs on Security

Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. “I’m addicted right now, I’m interested in trading, defi, blockchain, new projects,” Stern told “ Bloodrush ” on Nov.

article thumbnail

North Korea Is Now Mining Crypto to Launder Its Stolen Loot

WIRED Threat Level

A spy group working for the Kim regime has been feeding stolen coins into crypto mining services in an effort to throw tracers off their trail.

Mining 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Betteridge’s law of headlines says no, but according to an interesting blog from Cisco’s Talos Intelligence Group this week, criminals eager to cash in while the cryptocurrency bubble continues to inflate are increasingly taking a different approach: cutting out the middleman and using cryptominers. Ed Balls day is 28 April.).

Mining 66
article thumbnail

FTX Collapse Highlights the Cybersecurity Risks of Crypto

eSecurity Planet

From compromised systems integrity and faulty regulatory oversight abroad, to the concentration of control in the hands of a very small group of inexperienced, unsophisticated and potentially compromised individuals, this situation is unprecedented.”. One way is through hijacking computer resources to mine cryptocurrencies.

article thumbnail

FRANCE: CNIL publishes initial analysis on Blockchain and GDPR

DLA Piper Privacy Matters

The French Data Protection Supervisory Authority (the CNIL) has recently published its initial thoughts on this topic, providing some responses and practical recommendations on how the usage of a blockchain may be compatible with GDPR and more generally Data Protection Law, taking into account the “constraints” imposed by such technology. .

article thumbnail

To get the most from blockchain in government, a sharing mindset is needed

CGI

To get the most from blockchain in government, a sharing mindset is needed. Twenty-five years later, blockchain is here and can bring those use cases to life. However, blockchain requires organizations to think about their data not as an asset they own, but as a shared resource—a shift in mindset that is not easy for everyone.

article thumbnail

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

Security Affairs

.” The binary establishes a connection to the C&C server, then scans processes running on the compromised device and attempts to kill any that are running the CoinHive script that could be mining Monero. He is currently Global CISO for the ATCO Group of companies. Pierluigi Paganini.

Mining 51