Uncovering FTX Bankruptcy: Reserves, SBF, Alameda & Binance
FTX Bankruptcy: SBF, Alameda, Binance, VC funds, hack, federal investigation, Proof of Reserves, calls for transparency
🇺🇦 Hacken stands with Ukraine!Learn more
Malicious actors are sending phishing emails claiming to be from the IRS. The purpose of these emails is to infect victims’ PCs with malware or trick users to transfer their personal information such as usernames, passwords, etc. Although these scams are not particularly sophisticated, they are sent at the time of tax deadlines. Even if a minor share of potential victims opens these emails, malicious actors can steal massive volumes of data.
The scam email can infect victims with Emotet malware, a trojan used to steal passwords while creating a backdoor onto the infected computer. The email contains a malicious attachment called “W-9 form.zip”. When opening the attachment, users are asked to enable macros. All sensitive information stolen can be used to compromise victims’ online as well as banking accounts.
According to the information provided by a top Ukrainian cybersecurity official, russian hackers are attacking logistical lines including those delivering food and other humanitarian support. Cyberattacks are mostly linked to Russia’s ground and air campaign. Russian hackers have also targeted Ukrainian energy companies and internet-service providers.
Russia has also tried to crash Ukrainian communication networks but has failed to reach this goal. The Ukrainian officials have also admitted priceless assistance from Elon Musk’s Space Exploration Technologies Corp. SpaceX’s Starlink service has provided backup Internet in Ukraine. The official has also noted that some cyberattacks are linked to other than the Russian government but there is no proof whether they are aligned with the activities of russian-backed actors.
First, the Covid-19 pandemic drove the cybersecurity boom due to a rapid increase in the popularity of remote work. During the pandemic crisis, the cybersecurity industry raised billions in venture capital and launched tons of solutions for digital protection. Officials worldwide are appealing to businesses to motivate them to apply best security practices to address possible risks. Biden’s administration has warned businesses that Russia may respond to Western sanctions by launching massive cyberattacks.
Businesses have already taken action. US banks have improved their cyber defences while US governors have prioritized strengthening the protection of critical infrastructure. Cybersecurity companies are sure that the boom in their industry will continue. The role of managers is to keep their workforce informed about threats.
The hack of HubSpot, a tool used by companies to manage marketing campaigns and onboard new users, has also affected BlockFi, Swan Bitcoin, NYDIG and Circle. However, according to these companies, their operations and treasuries remained unaffected. Users’ passwords and other internal information also were not compromised by attackers.
The HubSpot hack was the result of access by a malicious actor to an employee account. It was used to target stakeholders in the crypto industry. Some users stated that they received phishing emails from the affected companies.
Cloudflare provides data showing the countries with the highest concentration of DDoS traffic. Cloudflare has tracked a significant spike in hacking activities worldwide since the beginning of the Russian invasion of Ukraine. It will take a lot of time even to understand who was participating. Cloudflare has released data to show the top 10 countries where a certain kind of hack is coming from.
According to Cloudflare, the top 10 sources of DDoS attacks are:
Ukraine, Spain, and Malaysia appear to be “punching above their weight”, they have small populations compared to other countries from this list.