Uncovering FTX Bankruptcy: Reserves, SBF, Alameda & Binance
FTX Bankruptcy: SBF, Alameda, Binance, VC funds, hack, federal investigation, Proof of Reserves, calls for transparency
Hacken is launching a monitoring tool. Get details and join our beta program
The surveillance company NSO Group developed an exploit allowing the users of its software to gain access to an iPhone to install malware – in this case, a target does not even need to click on a link. Last month, NSO Group was added to the “entity list” of the US Department of Commerce due to the evidence that the company might have been involved in supplying spyware to foreign governments that later used it to target business people, embassy workers, officials, journalists, etc.
Google’s Project Zero has conducted the analysis of a new NSO “zero-click” exploit for iOS 14.71. According to the Project Zero researchers, it’s likely to be one of the most technically sophisticated exploits ever detected. This exploit may allow malicious actors to run Java-Script like code in the component of iOS that handles GIFs but, normally, doesn’t support scripting capabilities. As a result, malicious actors can remotely hack iPhone by writing to arbitrary memory locations.
A new cybercrime campaign is bringing back the notorious Anubis malware banking trojan. This malware allows hackers to steal targets’ credit card details, GPS data, SMS messages as well as utilize other accessibility services enabled in the targeted device. This malware was first recorded in 2016. This malware is known for targeting the customers of financial institutions related to virtual payment platforms or cryptocurrency wallets. This trojan resurfaced in 2020.
Its latest version has “almost-functional” ransomware module allowing malicious actors to encrypt data on the victims’ devices. Anubis malware actively exploits the Covid-19 threat and scams victims by impersonating legitimate resources. For example, attackers impersonate the official page of the World Health Organization and urge victims to download special files. As a result, they actually download Anubis malware.
The Polygon-based NFT marketplace Vulcan Forged was hacked on 12 December. Malicious actors stole 4.5M PYR tokens – the native tokens of the platform. The stolen tokens are worth around $140M. Although almost all impacted users were immediately reimbursed, the value of tokens has plummeted. The platform was applying the “semi-custodial” model for controlling each user’s wallet. However, it failed to properly secure them from its end.
The new solution offering fully decentralized wallet management is now being rolled out. All stolen tokens have been identified and the platform is actively working on uncovering the footprints of the malicious actors responsible for this incident.
As of 2021, the size of the DDoS protection and mitigation market is $3.3B. It’s likely to demonstrate the compound annual growth rate at 15.1% from 2021 to 2026. The rise in multi-vector DDoS attacks will boost demand for DDoS mitigation solutions. Also, companies will have to integrate DDoS protection solutions into their processes due to new regulations to be imposed by governments.
The services provided by DDoS protection vendors allow clients to safeguard websites and networks. By cooperating with DDoS protection vendors companies can make their systems resistant to DNS-amplification, NTP amplification, HTTP Flood, SYN Flood, spoofing attacks, and other forms of DDoS threats.
In November 2021, the total capitalization of the crypto market surpassed $3T. However, the rapid increase in the popularity of cryptocurrencies has also created huge opportunities for scammers. In 2021, many notable hacks involved the projects representing the decentralized finance world. DeFi projects lost more than $10B due to thefts and fraud, according to the information provided by analytic firm Elliptic. Although the scope of risks is unprecedented, there are some tips by following which investors can protect themselves from possible theft of their assets or data.
The list of most effective tips is the following:
Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email